<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3633171899780417098</id><updated>2024-12-18T22:27:07.410-05:00</updated><category term="Google"/><category term="Apple"/><category term="security"/><category term="Amazon"/><category term="LastPass"/><category term="Microsoft"/><category term="WiFi"/><category term="cloud"/><category term="privacy"/><category term="Chrome"/><category term="HomeKit"/><category term="Insteon"/><category term="SmartThings"/><category term="Solo Traveler"/><category term="VPN"/><category term="cryptography"/><category term="1Password"/><category term="802.11ac"/><category term="Android"/><category term="Harmony"/><category term="NAS"/><category term="Nest"/><category term="Netflix"/><category term="Samsung"/><category term="Smart Home"/><category term="Synology"/><category term="The Cloud"/><category term="Time Machine"/><category term="WIndows"/><category term="Wink"/><category term="iCloud"/><category term="passwords"/><category term="ransomware"/><category term="traveling"/><category term="2.4 GHz"/><category term="32bit"/><category term="5 GHz"/><category term="64bit"/><category term="802.11n"/><category term="A7"/><category term="AT&amp;T"/><category term="AWS"/><category term="Acronis"/><category term="AirDrop"/><category term="Airtame"/><category term="Andriod"/><category term="Apple TV"/><category term="August"/><category term="BLEEPINGCOMPUTER"/><category term="Bell Canada"/><category term="Best Buy"/><category term="Bitcoin"/><category term="Blumoo"/><category term="CES 2015"/><category term="CES2015"/><category term="Cable TV"/><category term="Chromcast"/><category term="Clearwire"/><category term="Clicker"/><category term="Cogent"/><category term="Comcast"/><category term="Consumer Electronics Show"/><category term="D-Link"/><category term="DSLR"/><category term="Deutsche Bahn"/><category term="Disney"/><category term="Duracell"/><category term="Dyn"/><category term="Echo"/><category term="Ecobee"/><category term="Ecobee 3"/><category term="Eero"/><category term="FedEx"/><category term="Firefox"/><category term="Flash Drives"/><category term="Flic"/><category term="Freshbooks"/><category term="Geo-fence"/><category term="Google Play"/><category term="Guardian"/><category term="HDTV"/><category term="HTTPS"/><category term="Home Depot"/><category term="Home Plug"/><category term="Hub"/><category term="Hue"/><category term="Hulu"/><category term="IFTTT"/><category term="ISP"/><category term="Intelligentsia"/><category term="Internet Explorer"/><category term="Internet of Things"/><category term="KRACK"/><category term="LATAM Airlines"/><category term="LIFX"/><category term="Leeo"/><category term="Linksys"/><category term="Linux"/><category term="Logitech"/><category term="Logitech Harmony"/><category term="Lowes"/><category term="Lutron"/><category term="M7"/><category term="Mac"/><category term="Mac OS"/><category term="MacOS"/><category term="Macintosh"/><category term="Mashable"/><category term="Mesh"/><category term="NFC"/><category term="NSA"/><category term="Nest Protect"/><category term="Nest Thermostat"/><category term="Net Neutrality"/><category term="Norton"/><category term="OASW"/><category term="Office 365"/><category term="Okidokeys"/><category term="OneDrive"/><category term="Opera"/><category term="PGPDisk"/><category term="Pandora"/><category term="PayPal"/><category term="Phil Schiller"/><category term="Philips Hue"/><category term="Powermat"/><category term="Qikster"/><category term="RAID"/><category term="Revolv"/><category term="SSD"/><category term="SSL"/><category term="Safari"/><category term="Scout"/><category term="Shields UP"/><category term="Solid State Drives"/><category term="Somfy"/><category term="Steve Gibson"/><category term="StrongVPN"/><category term="Superman Memory Crystals"/><category term="Symantec"/><category term="Telefónica"/><category term="Terracotta Soldiers"/><category term="Thread"/><category term="Touch ID"/><category term="TruCrypt"/><category term="UCSD"/><category term="UK NHS"/><category term="UPnP"/><category term="USB Flash"/><category term="VOIP"/><category term="Verizon"/><category term="WPA2"/><category term="WanaCrypt0r 2.0"/><category term="Wanna Decryptor"/><category term="WannaCry"/><category term="WannaCrypt"/><category term="WeMo"/><category term="Wear Leveling"/><category term="WiFi Alliance"/><category term="WiFi network"/><category term="WiFi router"/><category term="Windows XP"/><category term="Works with Nest"/><category term="YouTube"/><category term="Yves Behar"/><category term="Z-wave"/><category term="ZigBee"/><category term="Zuli"/><category term="broadband"/><category term="business"/><category term="cloud 101"/><category term="cloud storage"/><category term="cryptolocker"/><category term="cryptoprevent"/><category term="encrypt"/><category term="encryption"/><category term="entertainment"/><category term="fast lane"/><category term="finances"/><category term="fingerprint"/><category term="iOS"/><category term="iOS 7"/><category term="iPhone"/><category term="iPhone 5S"/><category term="iSmartAlarm"/><category term="iStumbler"/><category term="iTunes Radio"/><category term="identity theft"/><category term="inSSIDer"/><category term="insurance"/><category term="internet"/><category term="loss of assets"/><category term="online"/><category term="online security"/><category term="peering"/><category term="phishing"/><category term="phone service"/><category term="protect"/><category term="restrictions"/><category term="safeguard"/><category term="secure"/><category term="smartphones"/><category term="social engineering"/><category term="streaming"/><category term="tablets"/><category term="technology"/><category term="travel"/><category term="traveldudes"/><category term="unblocked internet"/><category term="wireless"/><title type='text'>iHelp Innovate</title><subtitle type='html'>Small Business and Consumer IT Support</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>20</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-3136563419371739724</id><published>2017-10-23T16:16:00.000-04:00</published><updated>2017-10-24T12:51:13.627-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><category scheme="http://www.blogger.com/atom/ns#" term="Apple"/><category scheme="http://www.blogger.com/atom/ns#" term="BLEEPINGCOMPUTER"/><category scheme="http://www.blogger.com/atom/ns#" term="Eero"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="HTTPS"/><category scheme="http://www.blogger.com/atom/ns#" term="KRACK"/><category scheme="http://www.blogger.com/atom/ns#" term="Linksys"/><category scheme="http://www.blogger.com/atom/ns#" term="Mesh"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="StrongVPN"/><category scheme="http://www.blogger.com/atom/ns#" term="VPN"/><category scheme="http://www.blogger.com/atom/ns#" term="WiFi"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><category scheme="http://www.blogger.com/atom/ns#" term="WPA2"/><title type='text'>Your KRACK is showing!</title><content type='html'>&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;You may have heard about it in the news, earlier
this year two researchers from the University of Leuven, Belgium submitted their
&lt;/span&gt;&lt;a href=&quot;https://www.krackattacks.com/#paper&quot; style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;research&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt; for review, exposing
a flaw in our WiFi security. They discovered a critical vulnerability they
dubbed, KRACK, which affects the WPA2 security of ALL client WiFi devices. For
clarity, examples of client devices are your laptop, phone, tablet, e-reader,
etc.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;helvetica neue&amp;quot;; mso-bidi-font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;helvetica neue&amp;quot;; mso-bidi-font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;helvetica neue&amp;quot;; mso-bidi-font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;Is this something you need to be concerned about?
Short answer is, YES!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitNb_V7EG_gOb-OipOBgONGDYwRnRruU685MEC5Ew2Utk2r1mY6iykP3K2GmFFIuRsUYhKSU8xV0u42FOsY8f5G2SAcYAgY4tCi1cqZQAE36ZcVpLWnfwUDjv3X_daAf12tjt3pNdkD7o/s1600/KRACK+logo-small.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;254&quot; data-original-width=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitNb_V7EG_gOb-OipOBgONGDYwRnRruU685MEC5Ew2Utk2r1mY6iykP3K2GmFFIuRsUYhKSU8xV0u42FOsY8f5G2SAcYAgY4tCi1cqZQAE36ZcVpLWnfwUDjv3X_daAf12tjt3pNdkD7o/s1600/KRACK+logo-small.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;helvetica neue&amp;quot;; mso-bidi-font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;If you’re using any Android device, it is of particular
concern, because this attack executed on an Android-based client can result in a
complete breakdown of the devices wireless security until this is patched. Fortunately,
the security patch is relatively simple, but you can expect manufacturers will
want to test it to make sure it doesn’t cause issues before releasing. Expect
to see big companies like&amp;nbsp;Apple publishing it as beta (aka, not ready for
primetime) at first.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt;&quot;&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;helvetica neue&amp;quot;; mso-bidi-font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;Devices such as WiFi access
points are at lower risk unless they also act as client devices themselves to
connect to other access points. Examples are wireless extenders and the new
“Mesh Network” devices such as Eero, Google WiFi, and Linksys Velop that connect
together to extend wireless access throughout your home. However, unless you’re
very tech-savvy, you may not be aware of a client capability your wireless
router has, and there is a long history of exploits against wireless routers.
Although less likely, it’s not impossible that a router could be attacked, have
its client capabilities enabled, and then compromised. Therefore, please do
update if possible, or check that your ISP has done this for you, if you are
one of them millions that rent a wireless router as part of your Internet
service.&lt;/span&gt;&lt;span style=&quot;mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;

&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;JA&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
   &lt;w:UseFELayout/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;
   &lt;m:brkBin m:val=&quot;before&quot;/&gt;
   &lt;m:brkBinSub m:val=&quot;&amp;#45;-&quot;/&gt;
   &lt;m:smallFrac m:val=&quot;off&quot;/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val=&quot;0&quot;/&gt;
   &lt;m:rMargin m:val=&quot;0&quot;/&gt;
   &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;
   &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;
   &lt;m:intLim m:val=&quot;subSup&quot;/&gt;
   &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;true&quot;
  DefSemiHidden=&quot;true&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;276&quot;&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; Name=&quot;Default Paragraph Font&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;59&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Table Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Placeholder Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Revision&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;List Paragraph&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; Name=&quot;Bibliography&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;
&lt;style&gt;
&lt;!--
 /* Font Definitions */
@font-face
 {font-family:&quot;ＭＳ 明朝&quot;;
 mso-font-charset:78;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-536870145 1791491579 18 0 131231 0;}
@font-face
 {font-family:&quot;Cambria Math&quot;;
 panose-1:2 4 5 3 5 4 6 3 2 4;
 mso-font-charset:0;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-536870145 1107305727 0 0 415 0;}
@font-face
 {font-family:Cambria;
 panose-1:2 4 5 3 5 4 6 3 2 4;
 mso-font-charset:0;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-536870145 1073743103 0 0 415 0;}
@font-face
 {font-family:&quot;Helvetica Neue&quot;;
 panose-1:2 0 5 3 0 0 0 2 0 4;
 mso-font-charset:0;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-452984065 1342208475 16 0 1 0;}
 /* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
 {mso-style-unhide:no;
 mso-style-qformat:yes;
 mso-style-parent:&quot;&quot;;
 margin:0in;
 margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:12.0pt;
 font-family:Cambria;
 mso-ascii-font-family:Cambria;
 mso-ascii-theme-font:minor-latin;
 mso-fareast-font-family:&quot;ＭＳ 明朝&quot;;
 mso-fareast-theme-font:minor-fareast;
 mso-hansi-font-family:Cambria;
 mso-hansi-theme-font:minor-latin;
 mso-bidi-font-family:&quot;Times New Roman&quot;;
 mso-bidi-theme-font:minor-bidi;}
.MsoChpDefault
 {mso-style-type:export-only;
 mso-default-props:yes;
 font-family:Cambria;
 mso-ascii-font-family:Cambria;
 mso-ascii-theme-font:minor-latin;
 mso-fareast-font-family:&quot;ＭＳ 明朝&quot;;
 mso-fareast-theme-font:minor-fareast;
 mso-hansi-font-family:Cambria;
 mso-hansi-theme-font:minor-latin;
 mso-bidi-font-family:&quot;Times New Roman&quot;;
 mso-bidi-theme-font:minor-bidi;}
@page WordSection1
 {size:8.5in 11.0in;
 margin:1.0in 1.25in 1.0in 1.25in;
 mso-header-margin:.5in;
 mso-footer-margin:.5in;
 mso-paper-source:0;}
div.WordSection1
 {page:WordSection1;}
--&gt;
&lt;/style&gt;
&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin:0in;
 mso-para-margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:12.0pt;
 font-family:Cambria;
 mso-ascii-font-family:Cambria;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Cambria;
 mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;



&lt;!--StartFragment--&gt;



&lt;!--EndFragment--&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;helvetica neue&amp;quot;; mso-bidi-font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;helvetica neue&amp;quot;; mso-bidi-font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;Although sites such as banks and Google are
already HTTPS encrypted, the researchers warn that this was easily bypassed in
a “worrying number of situations”. The good news is, if you’re using a VPN such
as StrongVPN to encrypt all your Internet traffic, you’re safe from attack, because
all of your data is rendered unintelligible to prying eyes the entire time you
are connected to the VPN service.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;helvetica neue&amp;quot;; mso-bidi-font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;Additionally, Mac and PC users do not need to be
concerned, because the WPA2 protocol was never properly implemented by either
Microsoft or Apple, which consequently made them immune to the attack, and
official patches are already available.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;helvetica neue&amp;quot;; mso-bidi-font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;Should you update everything you own that connects
by Wi-Fi? &amp;nbsp;In a word, yes, but since it may be very difficult to know
whether or not the manufacturer has updated your device automatically, or if it
must be done manually, whenever you have the opportunity to connect securely
via a VPN, we recommend you do so. This will make your life easier and take a
lot of worry off your mind.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;helvetica neue&amp;quot;; mso-bidi-font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;It’s also important to know that this attack is
very sophisticated at the moment, and requires an attacker to be within radio
proximity, such as free Wi-Fi in a coffee shop. But, black hat hackers do not wait
to take advantage of vulnerabilities like this, and you can be sure a method
of simplifying this attack is in the works, seeking those that are unknowingly
still vulnerable.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;

&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;JA&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
   &lt;w:UseFELayout/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;
   &lt;m:brkBin m:val=&quot;before&quot;/&gt;
   &lt;m:brkBinSub m:val=&quot;&amp;#45;-&quot;/&gt;
   &lt;m:smallFrac m:val=&quot;off&quot;/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val=&quot;0&quot;/&gt;
   &lt;m:rMargin m:val=&quot;0&quot;/&gt;
   &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;
   &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;
   &lt;m:intLim m:val=&quot;subSup&quot;/&gt;
   &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;true&quot;
  DefSemiHidden=&quot;true&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;276&quot;&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; Name=&quot;Default Paragraph Font&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;59&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Table Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Placeholder Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Revision&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;List Paragraph&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; Name=&quot;Bibliography&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;
&lt;style&gt;
&lt;!--
 /* Font Definitions */
@font-face
 {font-family:&quot;ＭＳ 明朝&quot;;
 mso-font-charset:78;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-536870145 1791491579 18 0 131231 0;}
@font-face
 {font-family:&quot;Cambria Math&quot;;
 panose-1:2 4 5 3 5 4 6 3 2 4;
 mso-font-charset:0;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-536870145 1107305727 0 0 415 0;}
@font-face
 {font-family:Cambria;
 panose-1:2 4 5 3 5 4 6 3 2 4;
 mso-font-charset:0;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-536870145 1073743103 0 0 415 0;}
@font-face
 {font-family:&quot;Helvetica Neue&quot;;
 panose-1:2 0 5 3 0 0 0 2 0 4;
 mso-font-charset:0;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-452984065 1342208475 16 0 1 0;}
 /* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
 {mso-style-unhide:no;
 mso-style-qformat:yes;
 mso-style-parent:&quot;&quot;;
 margin:0in;
 margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:12.0pt;
 font-family:Cambria;
 mso-ascii-font-family:Cambria;
 mso-ascii-theme-font:minor-latin;
 mso-fareast-font-family:&quot;ＭＳ 明朝&quot;;
 mso-fareast-theme-font:minor-fareast;
 mso-hansi-font-family:Cambria;
 mso-hansi-theme-font:minor-latin;
 mso-bidi-font-family:&quot;Times New Roman&quot;;
 mso-bidi-theme-font:minor-bidi;}
a:link, span.MsoHyperlink
 {mso-style-priority:99;
 color:blue;
 mso-themecolor:hyperlink;
 text-decoration:underline;
 text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
 {mso-style-noshow:yes;
 mso-style-priority:99;
 color:purple;
 mso-themecolor:followedhyperlink;
 text-decoration:underline;
 text-underline:single;}
.MsoChpDefault
 {mso-style-type:export-only;
 mso-default-props:yes;
 font-family:Cambria;
 mso-ascii-font-family:Cambria;
 mso-ascii-theme-font:minor-latin;
 mso-fareast-font-family:&quot;ＭＳ 明朝&quot;;
 mso-fareast-theme-font:minor-fareast;
 mso-hansi-font-family:Cambria;
 mso-hansi-theme-font:minor-latin;
 mso-bidi-font-family:&quot;Times New Roman&quot;;
 mso-bidi-theme-font:minor-bidi;}
@page WordSection1
 {size:8.5in 11.0in;
 margin:1.0in 1.25in 1.0in 1.25in;
 mso-header-margin:.5in;
 mso-footer-margin:.5in;
 mso-paper-source:0;}
div.WordSection1
 {page:WordSection1;}
--&gt;
&lt;/style&gt;
&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin:0in;
 mso-para-margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:12.0pt;
 font-family:Cambria;
 mso-ascii-font-family:Cambria;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Cambria;
 mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;



&lt;!--StartFragment--&gt;







&lt;!--EndFragment--&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;&quot;&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;helvetica neue&amp;quot;; mso-bidi-font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;To find detailed information about the &lt;a href=&quot;https://www.eff.org/deeplinks/2017/10/krack-vulnerability-what-you-need-know&quot;&gt;KRACK&lt;/a&gt;
vulnerability, be sure to visit the EFF post about it. For a list of updated
devices and those not yet updated, &lt;a href=&quot;https://www.bleepingcomputer.com/news/security/list-of-firmware-and-driver-updates-for-krack-wpa2-vulnerability/&quot;&gt;BLEEPINGCOMPUTER&lt;/a&gt;
is one site taking the lead on tracking this complicated issue.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;helvetica neue&amp;quot;; mso-bidi-font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;helvetica neue&amp;quot;; mso-bidi-font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot;;&quot;&gt;Have a comment or question? Please gives us your feedback in the comments sections and do join in the discussion on Twitter&amp;nbsp;&lt;a href=&quot;https://twitter.com/dougkrug&quot; target=&quot;_blank&quot;&gt;@dougkrug&lt;/a&gt;&amp;nbsp;&lt;span id=&quot;goog_1942685461&quot;&gt;&lt;/span&gt;&lt;a href=&quot;https://www.blogger.com/&quot;&gt;&lt;/a&gt;&lt;span id=&quot;goog_1942685462&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot;;&quot;&gt;where you&#39;ll find us posting about the latest news in tech, IoT and smart home innovations.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;helvetica neue&amp;quot;; mso-bidi-font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;helvetica neue&amp;quot;; mso-bidi-font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;style&gt;
&lt;!--
 /* Font Definitions */
@font-face
 {font-family:&quot;ＭＳ 明朝&quot;;
 mso-font-charset:78;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:1 134676480 16 0 131072 0;}
@font-face
 {font-family:&quot;ＭＳ 明朝&quot;;
 mso-font-charset:78;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:1 134676480 16 0 131072 0;}
@font-face
 {font-family:Cambria;
 panose-1:2 4 5 3 5 4 6 3 2 4;
 mso-font-charset:0;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-536870145 1073743103 0 0 415 0;}
@font-face
 {font-family:&quot;Helvetica Neue&quot;;
 panose-1:2 0 5 3 0 0 0 2 0 4;
 mso-font-charset:0;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-452984065 1342208475 16 0 1 0;}
 /* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
 {mso-style-unhide:no;
 mso-style-qformat:yes;
 mso-style-parent:&quot;&quot;;
 margin:0in;
 margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:12.0pt;
 font-family:Cambria;
 mso-ascii-font-family:Cambria;
 mso-ascii-theme-font:minor-latin;
 mso-fareast-font-family:&quot;ＭＳ 明朝&quot;;
 mso-fareast-theme-font:minor-fareast;
 mso-hansi-font-family:Cambria;
 mso-hansi-theme-font:minor-latin;
 mso-bidi-font-family:&quot;Times New Roman&quot;;
 mso-bidi-theme-font:minor-bidi;}
a:link, span.MsoHyperlink
 {mso-style-priority:99;
 color:blue;
 mso-themecolor:hyperlink;
 text-decoration:underline;
 text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
 {mso-style-noshow:yes;
 mso-style-priority:99;
 color:purple;
 mso-themecolor:followedhyperlink;
 text-decoration:underline;
 text-underline:single;}
.MsoChpDefault
 {mso-style-type:export-only;
 mso-default-props:yes;
 font-family:Cambria;
 mso-ascii-font-family:Cambria;
 mso-ascii-theme-font:minor-latin;
 mso-fareast-font-family:&quot;ＭＳ 明朝&quot;;
 mso-fareast-theme-font:minor-fareast;
 mso-hansi-font-family:Cambria;
 mso-hansi-theme-font:minor-latin;
 mso-bidi-font-family:&quot;Times New Roman&quot;;
 mso-bidi-theme-font:minor-bidi;}
@page WordSection1
 {size:8.5in 11.0in;
 margin:1.0in 1.25in 1.0in 1.25in;
 mso-header-margin:.5in;
 mso-footer-margin:.5in;
 mso-paper-source:0;}
div.WordSection1
 {page:WordSection1;}
--&gt;
&lt;/style&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/3136563419371739724/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2017/10/your-krack-is-showing.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3136563419371739724'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3136563419371739724'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2017/10/your-krack-is-showing.html' title='Your KRACK is showing!'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitNb_V7EG_gOb-OipOBgONGDYwRnRruU685MEC5Ew2Utk2r1mY6iykP3K2GmFFIuRsUYhKSU8xV0u42FOsY8f5G2SAcYAgY4tCi1cqZQAE36ZcVpLWnfwUDjv3X_daAf12tjt3pNdkD7o/s72-c/KRACK+logo-small.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-8054346230362916519</id><published>2017-05-15T23:27:00.000-04:00</published><updated>2017-05-16T13:07:29.044-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Acronis"/><category scheme="http://www.blogger.com/atom/ns#" term="Chrome"/><category scheme="http://www.blogger.com/atom/ns#" term="Deutsche Bahn"/><category scheme="http://www.blogger.com/atom/ns#" term="FedEx"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="Guardian"/><category scheme="http://www.blogger.com/atom/ns#" term="LATAM Airlines"/><category scheme="http://www.blogger.com/atom/ns#" term="Macintosh"/><category scheme="http://www.blogger.com/atom/ns#" term="MacOS"/><category scheme="http://www.blogger.com/atom/ns#" term="NAS"/><category scheme="http://www.blogger.com/atom/ns#" term="ransomware"/><category scheme="http://www.blogger.com/atom/ns#" term="Synology"/><category scheme="http://www.blogger.com/atom/ns#" term="Telefónica"/><category scheme="http://www.blogger.com/atom/ns#" term="Time Machine"/><category scheme="http://www.blogger.com/atom/ns#" term="UK NHS"/><category scheme="http://www.blogger.com/atom/ns#" term="WanaCrypt0r 2.0"/><category scheme="http://www.blogger.com/atom/ns#" term="Wanna Decryptor"/><category scheme="http://www.blogger.com/atom/ns#" term="WannaCry"/><category scheme="http://www.blogger.com/atom/ns#" term="WannaCrypt"/><category scheme="http://www.blogger.com/atom/ns#" term="WIndows"/><title type='text'>Beating Ransomeware So You Won&#39;t WannaCry</title><content type='html'>&lt;div class=&quot;gmail_default&quot; style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif; font-size: small;&quot;&gt;
The rise of &quot;Ransomware&quot;, has been steadily growing and the most recent spread of the ransomware identified by the names &lt;a href=&quot;https://en.wikipedia.org/wiki/WannaCry_ransomware_attack&quot;&gt;WannaCry, WannaCrypt, WanaCrypt0r 2.0 and Wanna Decryptor&lt;/a&gt; is BIG!&lt;br /&gt;
&lt;br /&gt;
If you&#39;re not familiar with &lt;a href=&quot;https://en.wikipedia.org/wiki/Ransomware&quot;&gt;Ransomware&lt;/a&gt;, you should be. It&#39;s a very disruptive and costly threat if you have no protected backup to recover from. &lt;a href=&quot;https://en.wikipedia.org/wiki/Ransomware&quot;&gt;Ransomware&lt;/a&gt; is malicious software that extorts victims by encrypting ALL files on their system and demanding payment to release the key necessary to decrypt user files and regain access. The victims are threatened with permanent loss of access to their files if they fail to pay-up within a typically short time frame.&lt;/div&gt;
&lt;div class=&quot;gmail_default&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8vKQWbw2-yQoSL8QfH5QSEnywtMzgvJp_4l6QzRAxB0FywgUrReHeleoMxa-ziLrEuGakRGHuYzQ3BI3Q6axmpsZ2Mm-41NTBJqIAdFqbvGy_1sgbazwvO2l0ZFNY-Q421CT0I9c2ieg/s1600/Wana_Decrypt0r_screenshot.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;241&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8vKQWbw2-yQoSL8QfH5QSEnywtMzgvJp_4l6QzRAxB0FywgUrReHeleoMxa-ziLrEuGakRGHuYzQ3BI3Q6axmpsZ2Mm-41NTBJqIAdFqbvGy_1sgbazwvO2l0ZFNY-Q421CT0I9c2ieg/s320/Wana_Decrypt0r_screenshot.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;gmail_default&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;gmail_default&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;gmail_default&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Widespread Damage&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
Reports suggest that upwards of 230,000 PCs running the Microsoft Windows operating system in 150 countries have been infected with WanaCry. Organizations such as the UK National Health Service, FedEx, Deutsche Bahn, LATAM Airlines, Telefónica and others have experienced widespread infection. These are obviously large organizations with very capable IT departments, so this is not a simple matter of incompetence as some are quick to suggest.&lt;br /&gt;
&lt;br /&gt;
The researcher who inadvertently activated a kill switch that stopped the spread of the ransomeware virus said in a quote from The Guardian, “This is not over. The attackers will realise how we stopped it, they’ll change the code and then they’ll start again.&quot; ​​No one should get too comfortable.&lt;br /&gt;
&lt;div style=&quot;font-family: arial, sans-serif; font-size: 12.8px;&quot;&gt;
&lt;div class=&quot;gmail_default&quot; style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.8px;&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;gmail_default&quot; style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Preventing Ransomware Attacks&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;Windows users:&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
If you&#39;re running Windows on a PC make sure you&#39;re have the latest critical updates installed, you are running anti-virus software AND anti-malware software.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;font-family: arial, sans-serif; font-size: 12.8px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: arial, sans-serif; font-size: 12.8px;&quot;&gt;
We suggest &lt;a href=&quot;https://www.google.com/chrome/&quot;&gt;Google Chrome&lt;/a&gt; as a web browser to reduce the risk of system wide infections executed through browser code.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;To check if Windows auto update is enabled:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Start &amp;gt; Control Panel &amp;gt; System &amp;amp; Security &amp;gt; Windows Update&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;Macintosh users:&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If you&#39;re a Macintosh user, make sure you&#39;re up-to-date with the latest MacOS security updates. Even though this particular ransomeware virus does not apply to Macintosh computers, there is no guarantee a previously undiscovered vulnerability in the MacOS won&#39;t also be found and exploited in future attacks. If you are using a Macintosh operating system older than 10.9, you are at risk of many type of attacks and should update your operating system if possible. If the computer does not support MacOS 10.9 or later, it&#39;s time to upgrade. &lt;br /&gt;
&lt;br /&gt;
We suggest &lt;a href=&quot;https://www.google.com/chrome/&quot;&gt;Google Chrome&lt;/a&gt; as a web browser to reduce the risk of system wide infections executed through browser code.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;To check MacOS is up-to-date:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Apple Menu &amp;gt; About This Mac &amp;gt; Software Update...&lt;br /&gt;
&lt;div&gt;
&lt;div class=&quot;gmail_default&quot; style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif;&quot;&gt;
&lt;div style=&quot;font-size: small;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Backup properly - Not to a USB Flash Drive&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
As always, after updating the operating system and any applicable protection software, the best line of defense is a complete backup of your computer.&lt;br /&gt;
&lt;br /&gt;
Macintosh users should utilize the built-in &lt;b&gt;&lt;a href=&quot;https://support.apple.com/en-ca/HT201250&quot; target=&quot;_blank&quot;&gt;Time Machine&lt;/a&gt;&lt;/b&gt; backup software. With the exception of a few system settings, Apple Time Machine can restore your Mac or migrate to a new one as if nothing had changed. In the case of a new computer, you get the benefits of the latest OS, with all your existing files and programs intact, and exactly where you left them.&lt;br /&gt;
&lt;br /&gt;
Windows users have many choices, but we prefer &lt;a href=&quot;http://www.acronis.com/en-us/&quot;&gt;&lt;b&gt;Acronis True Image&lt;/b&gt;&lt;/a&gt; for it&#39;s ability to return the system to a state where it would seem nothing had ever happened, and for painless migrations to new machines when it&#39;s time.&lt;br /&gt;
&lt;div class=&quot;gmail_default&quot; style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif; font-size: small;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;gmail_default&quot; style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif;&quot;&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Backing up is more important than ever before!&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;gmail_default&quot; style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif; font-size: small;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
While any backup at all is a good backup, redundant backups are always better. Ransomware can often attack ALL drives that are attached and mapped to the operating system. Keeping data on a separate drive that is not connected is one method, but the problem we see often is, people forget to plug it in, so their backups are out of date. A single backup drive is also a risk when it&#39;s used for double purpose. We see this often with laptops that don&#39;t have enough storage space.  Data, photos and videos end up on the backup drive because it has lots of free space, but then it&#39;s only in one place.&lt;br /&gt;
&lt;br /&gt;
Drive failure is also a very real risk. It&#39;s a great feeling when we&#39;re able to recover data from a hard drive that has started to malfunction. Our clients are happy and that make us feel great too. Unfortunately in some cases, it&#39;s not possible.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
With drives that won&#39;t spin up or with some solid state hard drive failures, the only choice is an expensive recovery service. Expect companies that specialize in data recovery to charge anywhere from $500 for just a small amount of your data to $1000 or much more, depending on how much data has to be recovered and how difficult the steps required are to get it back.&lt;br /&gt;
&lt;div class=&quot;gmail_default&quot; style=&quot;background-color: white; color: #222222; font-size: small;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif; font-size: small;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7lexqSP3jWWmPrcrk9zpmayoSoc4TVbLm2OuOTCiB0O2ZbCIQDSpEPn6kJ5vorATclMD24PuP-bAJ2LWKnZkkW_HySTcGcAE8W38eD6rF6DJY07bbg9QHYcEtYxknj6aPrd1ZjlQt3TY/s1600/SSD+data+inspection+image.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;137&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7lexqSP3jWWmPrcrk9zpmayoSoc4TVbLm2OuOTCiB0O2ZbCIQDSpEPn6kJ5vorATclMD24PuP-bAJ2LWKnZkkW_HySTcGcAE8W38eD6rF6DJY07bbg9QHYcEtYxknj6aPrd1ZjlQt3TY/s200/SSD+data+inspection+image.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;gmail_default&quot; style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;If you have data in just one place, you are at risk&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;gmail_default&quot; style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif; font-size: small;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
Don&#39;t fall into the trap of not backing up because it&#39;s inconvenient. If you know you&#39;re not disciplined enough, don&#39;t have the time, or simply don&#39;t want to spend a lot of time manually duplicating backups, take action and get a reliable automated solution. It&#39;s painful when we can&#39;t recover a drive that had our client&#39;s family photos on it, but we know our pain is nothing compared to what they are feeling. Most can&#39;t afford to take their faulty hard drive to one of the expensive recovery services, so it makes sense to invest in comparatively inexpensive automated backup solutions&lt;br /&gt;
&lt;div class=&quot;gmail_default&quot; style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif; font-size: small;&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;gmail_default&quot; style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Three backup are best - One off-site&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
Theft and fire are also very real risks. When a client recently came to us with the news of a stolen laptop and a single backup drive that could not be accessed, we were happy the story ended well and we were able to recover the 5 years of data they had backed up on that hard drive. They made the smart choice of purchasing a Synology NAS  (Network Attached Storage) drive after that experience.&lt;br /&gt;
&lt;br /&gt;
In March 2017, we wrote about the &lt;a href=&quot;http://www.ihelpinnovate.com/2017/03/taking-control-back-from-cloud.html&quot;&gt;benefits of a NAS (Network Attached Storage)&lt;/a&gt; drive to reduce dependency on cloud backups, but these devices are also capable of automatic redundant system backups, including one of them on a cloud drive for automatic off-site backup.&lt;br /&gt;
&lt;div class=&quot;gmail_default&quot; style=&quot;background-color: white; color: #222222; font-size: small;&quot;&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif; font-size: small;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;background-color: white; clear: both; color: #222222; font-family: arial, sans-serif; font-size: small; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSbg_6-_fMhF4pD6vri8ADCDuG9ihcZYr-36tI8Cob4_QzbkCNrpibvl8Srk1vYx3yeMC9EtJ5WF4hUT_4rYHWLDeITj3GJlY2fkoFXh0O8ED1elRDQEwaa6o5sISMExpFXkYh0BexITY/s1600/Synology+DS115j+front+view.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;214&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSbg_6-_fMhF4pD6vri8ADCDuG9ihcZYr-36tI8Cob4_QzbkCNrpibvl8Srk1vYx3yeMC9EtJ5WF4hUT_4rYHWLDeITj3GJlY2fkoFXh0O8ED1elRDQEwaa6o5sISMExpFXkYh0BexITY/s320/Synology+DS115j+front+view.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Synology NAS drives can also be configured to keep an external backup drive off-line and only connect it when it performs a backup of your backup files in the middle of the night. When the backup is complete, the drive ejects until the next backup. This is a great way to keep backed up files secure from many type of ransomware attacks.&lt;br /&gt;
&lt;br /&gt;
If you are not regularly backing up your system, photos and videos on three different physical drives (one of them off-site), ask us about a Synology NAS for your home or business. We can provide a free quote for automatic worry-free file backup. Your system can even backup via a wireless connection where appropriate.&lt;/div&gt;
&lt;div class=&quot;gmail_default&quot;&gt;
&lt;div style=&quot;background-color: white; color: #222222;&quot;&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.8px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
Please &lt;a href=&quot;mailto:doug@ihelpinnovate.com&quot;&gt;reach out&lt;/a&gt; to us and we&#39;ll help you choose the right fit for your home or business. Ask us about free demonstrations so you&#39;ll know you&#39;re getting the right solution before you buy.&lt;/div&gt;
&lt;div style=&quot;font-family: arial, sans-serif; font-size: 12.8px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;i style=&quot;font-family: Verdana, Geneva, sans-serif; font-size: 15.4px;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: xx-small;&quot;&gt;Image courtesy of thanunkorn/Freedigitalphotos.net&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/8054346230362916519/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2017/05/beating-ransomeware-so-you-wont-wannacry.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/8054346230362916519'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/8054346230362916519'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2017/05/beating-ransomeware-so-you-wont-wannacry.html' title='Beating Ransomeware So You Won&#39;t WannaCry'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8vKQWbw2-yQoSL8QfH5QSEnywtMzgvJp_4l6QzRAxB0FywgUrReHeleoMxa-ziLrEuGakRGHuYzQ3BI3Q6axmpsZ2Mm-41NTBJqIAdFqbvGy_1sgbazwvO2l0ZFNY-Q421CT0I9c2ieg/s72-c/Wana_Decrypt0r_screenshot.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-3053938975722265016</id><published>2017-03-19T18:00:00.000-04:00</published><updated>2017-03-24T02:27:04.333-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Amazon"/><category scheme="http://www.blogger.com/atom/ns#" term="Apple"/><category scheme="http://www.blogger.com/atom/ns#" term="AWS"/><category scheme="http://www.blogger.com/atom/ns#" term="cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="Dyn"/><category scheme="http://www.blogger.com/atom/ns#" term="Freshbooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="iCloud"/><category scheme="http://www.blogger.com/atom/ns#" term="LastPass"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="NAS"/><category scheme="http://www.blogger.com/atom/ns#" term="Office 365"/><category scheme="http://www.blogger.com/atom/ns#" term="OneDrive"/><category scheme="http://www.blogger.com/atom/ns#" term="PayPal"/><category scheme="http://www.blogger.com/atom/ns#" term="RAID"/><category scheme="http://www.blogger.com/atom/ns#" term="Synology"/><category scheme="http://www.blogger.com/atom/ns#" term="Time Machine"/><category scheme="http://www.blogger.com/atom/ns#" term="VPN"/><title type='text'>Taking control back from the cloud</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
When we founded iHelp Innovate, there was and still is a primary goal in mind. Make it simple.&lt;br /&gt;
&lt;br /&gt;
For this, we&#39;ve always been big proponents of cloud based solutions like iCloud, Google, Microsoft Office 365, FreshBooks and LastPass to name just a few. But, as the cloud has grown into serious business, prices have steadily increased and free tiers are either shrinking or disappearing altogether.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Clouds of a different shape&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Cloud services are under greater threat of attack with their growth in popularity, and as millions discovered in recent months, the threats from attack and mistakes can result in lost productivity and revenue. We&#39;re referring to the highly publicized &lt;a href=&quot;https://www.wsj.com/articles/denial-of-service-web-attack-affects-amazon-twitter-others-1477056080&quot; target=&quot;_blank&quot;&gt;attack on Dyn&lt;/a&gt;, the domain name provider for many large companies like Amazon and PayPal, as well as the massive &lt;a href=&quot;http://www.recode.net/2017/3/2/14792636/amazon-aws-internet-outage-cause-human-error-incorrect-command&quot; target=&quot;_blank&quot;&gt;Amazon Web Services (AWS) outage&lt;/a&gt; caused by human error.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Pay up, or else...&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Many proud owners of shiny new iPhones and iPads will come to the realization shortly after purchase, that the 5 GB of iCloud data storage that Apple provides free of charge, is quickly filled and they are now expected to pay a monthly fee to store data and pictures in the cloud. Even Macintosh and Windows 10 PC owners are now encouraged to store everything in the cloud, and then a short time later are told they&#39;re out of space and will have to pay the monthly fee to continue backing up their data and photos.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Taking back control&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: white; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;Tired of iCloud, Google and OneDrive telling you you&#39;re out of space and asking you for more money? We&#39;ve got new solutions to automatically shift cloud storage so everyone in your office or family can be covered for no more that $1 per month or less. It&#39;s not a subscription and you own it. You&#39;ll only have to pay for the electricity to run it and that&#39;s somewhere between 50 cents to 1 dollar per month, depending on how often you access it.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;background-color: white; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;background-color: white; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;How about securely&amp;nbsp;and privately accessing content on the internet? Previously we suggested doing this with an additional WiFi router, but as the threat to privacy has grown, VPN or Virtual Private Network providers are no longer supporting connections that don&#39;t have ultra strong security. This results in slow performance with routers that don&#39;t have the processing power to handle the extra computations required by stronger encryption methods.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;background-color: white; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;background-color: white; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;What if you could have 24/7 access to your Documents, Music, Photos, Videos, and have every device wirelessly and regularly backed up, plus have instant access to a secure VPN connection, giving every device a border-free internet connection, without slowing it down? Not only do we have that solution, but it will also back itself up automatically, and notify by email or text message of any abnormal events.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;background-color: white; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;background-color: white; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;b&gt;Introducing Synology&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;background-color: white; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;We&#39;re excited to be able to offer all this in a compact, quite device, no bigger than a standard hard drive. It&#39;s eco-friendly too, consuming no more power than a typical LED lightbulb.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHZGbMRBvdUqXTomi3x5MeTYGtNS3zqZcZlk6dnjan9uPkkUoZSwL86cf__MgsNyN39GBqg_Lo5KumaW8NIVX61zAe1EagL1zCa_gxbtxObqXIjGkk_gHW1ezicwhNNS9CB_sw6Qg1n4Y/s1600/Synology+DS115j+front+view.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;214&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHZGbMRBvdUqXTomi3x5MeTYGtNS3zqZcZlk6dnjan9uPkkUoZSwL86cf__MgsNyN39GBqg_Lo5KumaW8NIVX61zAe1EagL1zCa_gxbtxObqXIjGkk_gHW1ezicwhNNS9CB_sw6Qg1n4Y/s320/Synology+DS115j+front+view.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;https://www.synology.com/en-us/products/DS115j#overview&quot; target=&quot;_blank&quot;&gt;Meet Synology&lt;/a&gt;. A Network Attached Storage or NAS device, capable of all the above mentioned and more, with no extras to buy, no monthly fees, and no heavy support requirements or massive electric bills. Whether you&#39;re a home user or a small business owner, Synology makes a powerful, low cost NAS device that fits perfectly.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: large;&quot;&gt;&lt;b&gt;Features&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;Music backup and remote access&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;ul&gt;
Free space on your laptop by moving music to a Synology NAS, but still access it like you never left your home or office.&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Photo backup&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
Keep your phone free to take new photos without having to pay higher and higher rates for cloud storage. In fact, you&#39;ll pay nothing at all to store multiple terabytes of photos. Your phone can automatically upload photos to a free cloud service, then Synology will backup those same photos locally and then back that up again, even to another cloud! All fully automatic.&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Documents and Data&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
Never worry about losing your data to viruses, ransomware or equipment failure. Not only can Synology backup Macs with built-in Time Machine support, it can also backup PCs, plus backup itself to multiple free cloud services. It can even automatically encrypt all the data before sending it up to the cloud, so no one but you can ever access your private data.&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Access the internet privately at full speed&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
Can&#39;t get content because it&#39;s not available in your region, no problem. We still recommend a VPN for this, and Synology lets you do it without having to compromise your internet speed. This centralizing of the VPN account also allows a large number of users to access a VPN service without a need to purchase multiple account subscriptions.&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Store notes and access your own office software&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
There&#39;s no guarantee the notes you store with Apple, Google or Microsoft will remain private, but with Synology you can store notes and documents securely and privately without ever sending them to the cloud. Plus you can also backup everything locally and privately in the cloud for free. You control the encryption keys, not Apple, Google or Microsoft. There&#39;s even free office software included that you run and access on your own Synology device, keeping all your work safe and private.&lt;/ul&gt;
Ready to take back control of your files and save money?&amp;nbsp;We can install simple one drive solutions for home or multi-drive RAID solutions with automatic &quot;Hot Spare&quot; drives and offline backup for worry-free data management in your workplace.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Please&amp;nbsp;&lt;a href=&quot;mailto:doug@ihelpinnovate.com&quot; target=&quot;_blank&quot;&gt;reach out&lt;/a&gt;&amp;nbsp;to us and we&#39;ll help you choose the right fit for your home or business. Ask us about a free demonstrations so you&#39;ll know you&#39;re getting the right solution before you buy.&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.8px; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/3053938975722265016/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2017/03/taking-control-back-from-cloud.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3053938975722265016'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3053938975722265016'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2017/03/taking-control-back-from-cloud.html' title='Taking control back from the cloud'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHZGbMRBvdUqXTomi3x5MeTYGtNS3zqZcZlk6dnjan9uPkkUoZSwL86cf__MgsNyN39GBqg_Lo5KumaW8NIVX61zAe1EagL1zCa_gxbtxObqXIjGkk_gHW1ezicwhNNS9CB_sw6Qg1n4Y/s72-c/Synology+DS115j+front+view.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-3597945992722228601</id><published>2016-02-12T16:58:00.000-05:00</published><updated>2017-03-11T15:43:53.102-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ecobee 3"/><category scheme="http://www.blogger.com/atom/ns#" term="Insteon"/><category scheme="http://www.blogger.com/atom/ns#" term="LIFX"/><category scheme="http://www.blogger.com/atom/ns#" term="Logitech Harmony"/><category scheme="http://www.blogger.com/atom/ns#" term="Nest Protect"/><category scheme="http://www.blogger.com/atom/ns#" term="Nest Thermostat"/><category scheme="http://www.blogger.com/atom/ns#" term="Philips Hue"/><category scheme="http://www.blogger.com/atom/ns#" term="SmartThings"/><category scheme="http://www.blogger.com/atom/ns#" term="Thread"/><category scheme="http://www.blogger.com/atom/ns#" term="Wink"/><category scheme="http://www.blogger.com/atom/ns#" term="Works with Nest"/><title type='text'>How-to: Nest in a Hive with Ecobee 3</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
We really like the second generation&amp;nbsp;&lt;a href=&quot;https://nest.com/smoke-co-alarm/meet-nest-protect/&quot;&gt;Nest Protect&lt;/a&gt;.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy38FeS2JwgocvsYlZ4tyNtYQIZQRX1e00QtspJk8OzmuciCR-Ib2hH_fF3Di3y0Ws3h17PoRMCAZIu89L6UE-QkojR3UHkZwlmzI_hQScpf-saow2Jew6gbHew_uvpo8riE0voFn8QFTv/s1600/Nest+Protect.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;276&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy38FeS2JwgocvsYlZ4tyNtYQIZQRX1e00QtspJk8OzmuciCR-Ib2hH_fF3Di3y0Ws3h17PoRMCAZIu89L6UE-QkojR3UHkZwlmzI_hQScpf-saow2Jew6gbHew_uvpo8riE0voFn8QFTv/s640/Nest+Protect.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
Despite their early mistakes, they have now produced a really good product to help protect you from harm and property from damage. No other detector available to consumers can detect both slow and fast burning fires, plus CO, plus talk to you and wirelessly interconnect. There are eight other significant features, but this is not a&amp;nbsp;&lt;a href=&quot;http://www.cnet.com/products/nest-protect-second-generation/&quot;&gt;second generation Nest Protect review&lt;/a&gt;; instead, we&#39;re focusing on one particular feature.&lt;br /&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
The Nest Protect has a very special feature; in the event of a smoke or carbon monoxide emergency, it can communicate via&amp;nbsp;&lt;a href=&quot;http://www.threadgroup.org/&quot;&gt;Nest Thread protocol&lt;/a&gt;&amp;nbsp;to the Nest Thermostat and turn off your heating/cooling system to help limit danger from smoke or CO leaks spreading throughout your home. This is a big deal and we&#39;re not aware of any other smoke and CO alarm available today with this capability. But what if you decided a Nest Thermostat isn’t right for you, and instead prefer the Ecobee 3?&amp;nbsp;Don&#39;t hold your breath for Ecobee to join the “Works with Nest” program, but don&#39;t despair, there&#39;s a mediator that can easily make these competitors cooperate in perfect&amp;nbsp;&lt;i&gt;Harmony&lt;/i&gt;.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimEuMr8uPVjZU_vjY1Mtv2Uo8KxBYGGrYs2j8iyMZdG9l5vN7Y1MVemtmC2Q4pS_JFGmctpYZL3_sFzXRNiKajL4xcAc2GHaCWo-8ztXjs4jb0YTnUvNxSCkiKjmljFGbgxpIR1iqePjhH/s1600/Ecobee+3+homekit.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;283&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimEuMr8uPVjZU_vjY1Mtv2Uo8KxBYGGrYs2j8iyMZdG9l5vN7Y1MVemtmC2Q4pS_JFGmctpYZL3_sFzXRNiKajL4xcAc2GHaCWo-8ztXjs4jb0YTnUvNxSCkiKjmljFGbgxpIR1iqePjhH/s320/Ecobee+3+homekit.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Enter the&amp;nbsp;&lt;a href=&quot;http://www.logitech.com/en-us/product/harmony-hub?crid=60&quot;&gt;Logitech Harmony Hub&lt;/a&gt;.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
If you’re even slightly interested in home automation and you don’t have one of these, it is an invaluable intermediate hub that allows a large list of connected home products that would otherwise be isolated to connect with one another, as we wrote in a&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2016/01/how-to-choose-diy-smart-home-products.html&quot;&gt;previous post&lt;/a&gt;.&lt;br /&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzDTfkgoS0r2a81Qq14n2bE7otoiYg5dI9wMCTl03Sd8FVOUZIF9BVSDFGBhUstL5P5MzUXuIZY_3gmfiVDDaAY3mtYB0WAJKucfhGUl8Rp6yr430y480obRAyEeLoEIbQxo_puoBnQGBk/s1600/Harmony+Hub.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;273&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzDTfkgoS0r2a81Qq14n2bE7otoiYg5dI9wMCTl03Sd8FVOUZIF9BVSDFGBhUstL5P5MzUXuIZY_3gmfiVDDaAY3mtYB0WAJKucfhGUl8Rp6yr430y480obRAyEeLoEIbQxo_puoBnQGBk/s320/Harmony+Hub.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Alright, so now that you have a second generation Nest Protect, a Logitech Harmony Hub, and an Ecobee 3, follow these simple instructions to make them work together in the event of an emergency.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
1. If you’ve had your Harmony Hub for a while and it’s not running the latest firmware, you should update it first. This is done from the app on your smartphone or tablet. Click&amp;nbsp;&lt;a href=&quot;https://support.myharmony.com/en-us/how-to-update-your-harmony-software&quot;&gt;here&lt;/a&gt;&amp;nbsp;for an easy to follow guide on how to update the firmware on your Harmony Hub.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
2. In the Harmony app under “Devices”, add the Nest Protect and Ecobee.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
3. Create a new activity and call it “Emergency HVAC Off”.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
4. Edit the “Start Sequence” and select the name you assigned to your Ecobee Thermostat from the list of devices and click the next arrow.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
5. Now select your thermostat again on the next screen and set the “Mode” to OFF and “Hold” to ON, then click the x in the upper right to close the window. You should keep the field “When to Adjust” set to&amp;nbsp;&lt;b&gt;Always&lt;/b&gt;. Now click the next arrow.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
6. Leave the “End Sequence” unchanged. If you have an emergency, you will resume schedule on your thermostat manually once you are sure there is no danger.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
7. Select “Sensor Triggers” and choose the name you assigned to your Nest Protect. On the next screen tap CO, then “Emergency”, then “Save”. Do the same for a smoke emergency.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
8. Tap the next arrow, then once again and you’re done.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Now if there’s a CO or smoke emergency detected by your Nest Protect, it will talk to the Logitech Harmony Hub, which in turn will communicate with the Ecobee to automatically disable the HVAC system. If you have connected lights such as Insteon, Philips Hue, SmartThings, or LIFX, you can also set them to turn on if there’s a CO or smoke emergency. Similarly, you can do the same thing with a Wink Hub using “Robots”, since it also supports both Nest Protect and Ecobee.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;i&gt;&lt;b&gt;NOTE: This method of deactivating and activating devices in the event of a CO or smoke emergency requires WiFi and Internet access. If either is disrupted it will not work. This is not true of Nest Protect to Nest Thermostat, which use Nest Thread to communicate and therefor do not require internet access to disable an HVAC system the Nest Thermostat is wired to.&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Do you like this simple &quot;hack&quot;? Please &lt;a href=&quot;mailto:doug@ihelpinnovate.com&quot; target=&quot;_blank&quot;&gt;contact me&lt;/a&gt; or send me a tweet &lt;a href=&quot;https://twitter.com/dougkrug&quot; target=&quot;_blank&quot;&gt;@dougkrug&lt;/a&gt;&amp;nbsp;and let us know! If you have ideas of how you would or have bridged a smart home connection with the Harmony Hub, we&#39;d love to hear about it.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/3597945992722228601/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2016/02/how-to-nest-in-hive-with-ecobee-3.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3597945992722228601'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3597945992722228601'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2016/02/how-to-nest-in-hive-with-ecobee-3.html' title='How-to: Nest in a Hive with Ecobee 3'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy38FeS2JwgocvsYlZ4tyNtYQIZQRX1e00QtspJk8OzmuciCR-Ib2hH_fF3Di3y0Ws3h17PoRMCAZIu89L6UE-QkojR3UHkZwlmzI_hQScpf-saow2Jew6gbHew_uvpo8riE0voFn8QFTv/s72-c/Nest+Protect.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-7186479307706799664</id><published>2016-01-20T16:39:00.000-05:00</published><updated>2017-03-11T15:46:05.099-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Echo"/><category scheme="http://www.blogger.com/atom/ns#" term="Ecobee"/><category scheme="http://www.blogger.com/atom/ns#" term="Flic"/><category scheme="http://www.blogger.com/atom/ns#" term="Harmony"/><category scheme="http://www.blogger.com/atom/ns#" term="HomeKit"/><category scheme="http://www.blogger.com/atom/ns#" term="Hue"/><category scheme="http://www.blogger.com/atom/ns#" term="IFTTT"/><category scheme="http://www.blogger.com/atom/ns#" term="Insteon"/><category scheme="http://www.blogger.com/atom/ns#" term="iSmartAlarm"/><category scheme="http://www.blogger.com/atom/ns#" term="Leeo"/><category scheme="http://www.blogger.com/atom/ns#" term="Lutron"/><category scheme="http://www.blogger.com/atom/ns#" term="Nest"/><category scheme="http://www.blogger.com/atom/ns#" term="Scout"/><category scheme="http://www.blogger.com/atom/ns#" term="Smart Home"/><category scheme="http://www.blogger.com/atom/ns#" term="SmartThings"/><category scheme="http://www.blogger.com/atom/ns#" term="WeMo"/><category scheme="http://www.blogger.com/atom/ns#" term="Wink"/><category scheme="http://www.blogger.com/atom/ns#" term="Z-wave"/><category scheme="http://www.blogger.com/atom/ns#" term="ZigBee"/><category scheme="http://www.blogger.com/atom/ns#" term="Zuli"/><title type='text'>How-to: Choose DIY Smart Home Products</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;b&gt;|Updated - February 2017|&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;s1&quot;&gt;Early adoption of electronics is not without its risks, especially for startup companies struggling to survive what some might refer to as &quot;The Valley of Death&quot;, where a startup&#39;s early investor capital is running out and they are just beginning to approach the break even point. Many haven&#39;t made it and many more will not.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Even if the startup is actually a spinoff or acquisition by a larger corporation, they are responsible for turning a profit and if they don&#39;t or if there are product issues or concerns that tarnish a reputation, they are unlikely to make it past the initial dip or even a second, or third round of funding without enough momentum to carry them forward.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;This is a growth industry and it&#39;s projected to be massive. The stakes are high and there will be many new companies, bringing forth amazing products and ideas, but unfortunately many will not be around to support your purchase. So if you&#39;re well to do, an early adopter who doesn&#39;t care about the risks or you&#39;re just interested in funding new companies without any monetary gain, then you may only be interested in discovering who has reliable options. If you instead need to take a conservative approach to this new idea of the smart home, then you will hopefully gain both perspectives here.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;b&gt;Starting out - Watch for warning signs&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Your initial investment should be small. Look for a product or family of products that will solve a need or a powerful want. Spend a fair amount of time acquainting yourself with it to ensure you are happy and it meets or exceeds your expectations, but be realistic. &amp;nbsp;Be cautious of products from startups that offer &quot;a total solution&quot; in a single purchase. With advancements and rapid changes in IoT communications and operating layers, the total solution doesn&#39;t exist and will not exist until the dust settles and the victorious emerge.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;b&gt;Choose a team, but be willing to welcome free agents&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii4koe834fel8Eq9WdPh4arN4M9VKomY0JD77gw0j9w04XBuNhzUqx5uzeb5-9pZcqNjAyYCGJVzlSWtDU0_0QZ-UPpeCpfjVBk9tDbTEaSYGRO2ihWLOB0OxvgozMxZWBdYGvTC_NBlUT/s1600/Insteon+Hub+%2528HomeKit%2529+-+Product+Family.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;136&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii4koe834fel8Eq9WdPh4arN4M9VKomY0JD77gw0j9w04XBuNhzUqx5uzeb5-9pZcqNjAyYCGJVzlSWtDU0_0QZ-UPpeCpfjVBk9tDbTEaSYGRO2ihWLOB0OxvgozMxZWBdYGvTC_NBlUT/s320/Insteon+Hub+%2528HomeKit%2529+-+Product+Family.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;s1&quot;&gt;As young as the Smart Home industry is, there are some established brands&amp;nbsp;&lt;/span&gt;and communication protocols that are a pretty safe bet, but you have to make choices and at the moment, you will encounter limitations.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;The limitations can come in many forms:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;• Communication protocol&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;• Reliability&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;• Speed&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;• Accuracy&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;• Security&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Few offer everything, but do your homework and make sure the last point is well addressed. Even if there might still be potential security flaws (which is a risk factor you must consider), the company should have a documented and firm policy regarding the device security and updates to address any that are discovered.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdFbQYe83p1IrSnYLzcjSik10aA0RlZs35QMj0maujo_aWQ2b6dsXDULKfUEOoKhC6zX35fpgrVHUu37bHEMFfRp9lpqRgMJT_0lEgt33tv-b0r3cUY-O-JqnS3EBzH1jlz7TB1BOBeUfJ/s1600/Ecobee+3+homekit.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;175&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdFbQYe83p1IrSnYLzcjSik10aA0RlZs35QMj0maujo_aWQ2b6dsXDULKfUEOoKhC6zX35fpgrVHUu37bHEMFfRp9lpqRgMJT_0lEgt33tv-b0r3cUY-O-JqnS3EBzH1jlz7TB1BOBeUfJ/s200/Ecobee+3+homekit.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Apple is one such company and although they don&#39;t make any Smart Home devices, any product that is&amp;nbsp;&lt;a href=&quot;https://support.apple.com/en-ca/HT204903&quot; target=&quot;_blank&quot;&gt;Apple HomeKit&lt;/a&gt;&amp;nbsp;certified should meet that criteria as long as they are operated in the&amp;nbsp;&lt;a href=&quot;https://support.apple.com/en-ca/HT204903&quot; target=&quot;_blank&quot;&gt;Apple HomeKit&lt;/a&gt;&amp;nbsp;environment. To encourage adoption, most manufacturers products that support&amp;nbsp;&lt;a href=&quot;https://support.apple.com/en-ca/HT204903&quot; target=&quot;_blank&quot;&gt;Apple HomeKit&lt;/a&gt;&amp;nbsp;certified can also allow use with non-HomeKit compatible devices such as Android smart phones. If you connect your HomeKit certified smart home devices with non-Apple phones, tablets and uncertified hubs, the HomeKit security precautions cannot protect you. You will then become partially responsible for ensuring your device is securely connected to the internet.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;If you want to have maximum choice in the smart home of today, you should also expect to have multiple hubs in your house. A hub is typically in the form of a small box and is a device that connects your home network either via ethernet cable or WiFi, to the smart home devices that you want to control.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjN48py4TPyqIsUyDs2TmCkqbOhB-OffPNnBkbdbQk-Zm8SAVLHf_GhXN57_ZqVgJ5edyOSBKtDLJ7CcmyccDVJAXVxO4A1S8dOGZj2ESQwRHl3Ygj5NjtWquDULYDVkPYqSRlSaPwFLKH5/s1600/wink-hub-profile.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjN48py4TPyqIsUyDs2TmCkqbOhB-OffPNnBkbdbQk-Zm8SAVLHf_GhXN57_ZqVgJ5edyOSBKtDLJ7CcmyccDVJAXVxO4A1S8dOGZj2ESQwRHl3Ygj5NjtWquDULYDVkPYqSRlSaPwFLKH5/s200/wink-hub-profile.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;s1&quot;&gt;It is the translator from the internet to the language that your smart home devices speak.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Since there isn&#39;t one standard, it&#39;s best to keep your options open with at least two hubs and at least two different supported communication protocols among the two hubs. Expect to pay between $50 and $100 for each hub, depending on whether they are on sale or part of a kit that might lower the initial purchase price.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;b&gt;Plan how you will interact with your Smart Home&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Look ahead and plan what you might want to do and how you think you might like to use and interact with your new smart home. One of the hottest smart home products this year is the&amp;nbsp;&lt;a href=&quot;http://www.amazon.com/Amazon-SK705DI-Echo/dp/B00X4WHP5E#tech&quot; target=&quot;_blank&quot;&gt;Amazon Echo&lt;/a&gt;. What looks like nothing more than a Bluetooth speaker about the size of a tennis ball can, is in fact an assistant like no other. Echo spends it&#39;s days waiting for its wake word &quot;Alexa&quot;, and then springs to life with the ability to control the physical world on your command. The Echo is a marvel of natural language research that is sure to impress. This well designed gadget responds very quickly to every voice that&#39;s tried it in our testing center, including a visitor with a very heavy accent. He was surprised and said that Siri has a lot of trouble with his voice.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIml9hyphenhyphenQoNhbF3uCfCcUkq_vR0zjQw79TplwMeJRQZevZGhyphenhyphenB8nlNkdadYIJ57RVFPrOw9Hw7ZUaqjY7FJdx_QJR4PPdeuMOVkYbsFTixbLd2srI2XE0YeEoqM24G3vapquXj4qkVFhTcG/s1600/Amazon+Echo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIml9hyphenhyphenQoNhbF3uCfCcUkq_vR0zjQw79TplwMeJRQZevZGhyphenhyphenB8nlNkdadYIJ57RVFPrOw9Hw7ZUaqjY7FJdx_QJR4PPdeuMOVkYbsFTixbLd2srI2XE0YeEoqM24G3vapquXj4qkVFhTcG/s200/Amazon+Echo.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;s1&quot;&gt;Today, Echo is able to natively control lights and&amp;nbsp;&lt;/span&gt;outlets on hubs from&amp;nbsp;&lt;a href=&quot;http://www.insteon.com/amazon-echo&quot; target=&quot;_blank&quot;&gt;Insteon&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://www2.meethue.com/en-us/productdetail/philips-hue-white-and-color-ambiance-starter-kit-a19&quot; target=&quot;_blank&quot;&gt;Philips Hue&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.smartthings.com/&quot; target=&quot;_blank&quot;&gt;Samsung SmartThings&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://www.belkin.com/us/Products/home-automation/c/wemo-home-automation/&quot; target=&quot;_blank&quot;&gt;Belkin WeMo&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://www.wink.com/&quot; target=&quot;_blank&quot;&gt;Wink&lt;/a&gt;&amp;nbsp;and more are added on a regular basis. Echo can also control many other devices and perform other tasks via &quot;Skills&quot; which you could equate to apps on a smart phone or tablet. Another game changing connection service called&amp;nbsp;&lt;a href=&quot;https://ifttt.com/&quot; target=&quot;_blank&quot;&gt;IFTTT&lt;/a&gt;&amp;nbsp;(If This Then That) is also available to Echo users. As you ask &quot;Alexa&quot; to turn OFF or ON lights in your home, tell you the weather, read you the latest news, read a book to you, convert a measurement or tell you the traffic ahead of your commute, to name but a few of it&#39;s many uses, you get the real sense that a Star Trek like future we&#39;ve been waiting for has finally arrived.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;If you choose&amp;nbsp;&lt;a href=&quot;https://support.apple.com/en-ca/HT204903&quot; target=&quot;_blank&quot;&gt;Apple HomeKit&lt;/a&gt;&amp;nbsp;compatible devices, you can control them with Siri on iOS devices, but you&#39;ll need your iPhone or iPad near by, and all the devices HomeKit can control must bare the Apple HomeKit compatible label. Amazon Echo on the other hand can control devices and services from a much broader selection, and even some devices that allow both HomeKit and non-HomeKit compatibility.&amp;nbsp;&lt;a href=&quot;http://www.amazon.com/Amazon-SK705DI-Echo/dp/B00X4WHP5E#tech&quot; target=&quot;_blank&quot;&gt;Amazon Echo&lt;/a&gt;&amp;nbsp;pleasantly responds to anyone from across a room, without shouting or having to constantly repeat yourself.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;b&gt;Protocols to consider&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Decide what products you want and check their supported protocol before deciding how you will connect them. The current six most popular choices are Bluetooth LE, Lutron ClearConnect, Insteon, WiFi, ZigBee and Z-Wave. Each has strengths and weaknesses. None are dominant or perfect.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Strengths and Weaknesses of each:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;• Bluetooth LE - Ubiquitous, secure and low-power consumption, but not yet capable of forming a mesh network, where devices help each other by repeating signals from one device to the next. This significantly limits the possibilities because the transmission range is so short. Few smart home devices exist that can address the current limitation and those that do may not be compatible with the future hubs that will support Bluetooth Mesh Networking. However, Bluetooth is the one to watch. We definitely expect to see the first Bluetooth Mesh smart home products at CES 2017 or at least in the early part of the year.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;• Lutron ClearConnect - Designed for lighting control, Lutron&#39;s proprietary protocol is used in the DIY&amp;nbsp;&lt;a href=&quot;http://www.lutron.com/en-US/Products/Pages/SingleRoomControls/CasetaWireless/Overview.aspx&quot; target=&quot;_blank&quot;&gt;Caséta&lt;/a&gt;&amp;nbsp;product line and is well liked by those who are using it. It also controls Lutron Serena shades and certain Honeywell connected thermostats are compatible. While an Apple HomeKit version of their hub is also available, you must use Lutron switches and dimmers. Wink hubs are compatible with some of the devices, but controlling Serena shades still requires a Lutron hub.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;• Insteon - Mature protocol from a stable manufacturer that has a lot of experience with smart home and a large product selection. Most devices use a dual mesh network that utilizes both your home power lines and proprietary radio signals to repeat communications from one device to the next. The proprietary nature means the Insteon hub is restricted to controlling Insteon devices using the Insteon protocol, with the only exception being infrared devices via the Insteon to IR bridge and the just announced IP control of Sonos devices.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;• WiFi - Ubiquitous and devices do not require a hub. Problems can arise from signal loss (we&#39;ve all experienced that with WiFi) as each device must communicate back to the main router because it is not a mesh network. Power consumption is high and this lowers the feasibility of battery operated devices, but new methods of using low power are emerging. Known as 802.11ah or HaLow, it has just been announced and is not yet available. You&#39;re also going to need a new WiFi router, so our advice is to buy a hub and enjoy having a smart home today instead of years in the future.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;• ZigBee - Supported typically in lighting products such as Philips Hue, GE Link, Cree Connected and others. Uses radio only mesh networking and power consumption is very low, but compatibility from one manufacturer&#39;s ZigBee device to the next is hit and miss. Most manufactures test and certify devices for use on specific hubs to avoid support issues and dissatisfied customers.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;• Z-Wave - A large catalog of Z-Wave device are available. Power consumption is higher than ZigBee, but much lower than WiFi. Communication is radio only and setup can be challenging. More than one type of Z-Wave exist and this can be frustrating for a smart home owner who just wants things to work. The Wink hub, for example is Z-Wave Plus compliant, but some Z-Wave Plus devices simply will not work with Wink.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;b&gt;Which hub offers what protocol?&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;
&lt;a href=&quot;http://oort.technology/&quot; target=&quot;_blank&quot;&gt;Oort&lt;/a&gt;: Homegrown Bluetooth Mesh&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p4&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;&lt;a href=&quot;https://zuli.io/&quot; target=&quot;_blank&quot;&gt;Zuli Smart Plugs&lt;/a&gt;: Bluetooth LE&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;a href=&quot;http://www.cassianetworks.com/consumer&quot; target=&quot;_blank&quot;&gt;Cassia Networks&lt;/a&gt;&amp;nbsp;High power Bluetooth LE, up to 1000ft open air, expect less range in the real world where buildings exist&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p4&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;&lt;a href=&quot;http://www.casetawireless.com/Pages/ProProducts.aspx&quot; target=&quot;_blank&quot;&gt;Lutron Caséta Smart Bridge Pro with HomeKit&lt;/a&gt;: Lutron ClearConnect&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p4&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;&lt;a href=&quot;http://www.insteon.com/which-hub-are-you&quot; target=&quot;_blank&quot;&gt;Insteon 2245-222 Hub or Insteon 2243-222 Hub Pro&lt;/a&gt;:&amp;nbsp;with HomeKit: Insteon&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;a href=&quot;http://www.belkin.com/us/Products/home-automation/c/wemo-home-automation/&quot; target=&quot;_blank&quot;&gt;Belkin WeMo&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://us.dlink.com/home-solutions/connected-home/&quot; target=&quot;_blank&quot;&gt;D-Link&lt;/a&gt;, and&amp;nbsp;&lt;a href=&quot;http://idevicesinc.com/&quot; target=&quot;_blank&quot;&gt;iDevices&lt;/a&gt;: WiFi (iDevices also uses Bluetooth LE)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p4&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;&lt;a href=&quot;http://www2.meethue.com/en-us/productdetail/philips-hue-white-and-color-ambiance-starter-kit-a19&quot; target=&quot;_blank&quot;&gt;Philips Hue 2 with HomeKit&lt;/a&gt;: ZigBee&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;a href=&quot;https://www.smartthings.com/&quot; target=&quot;_blank&quot;&gt;SmartThings v2&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;http://www.wink.com/&quot; target=&quot;_blank&quot;&gt;Wink&lt;/a&gt;: Bluetooth LE, WiFi, ZigBee and Z-Wave (Wink also supports 433MHz Lutron and&amp;nbsp;&lt;a href=&quot;http://www.wink.com/products/kidde-smoke-and-co-alarm/&quot; target=&quot;_blank&quot;&gt;Kidde&lt;/a&gt;&amp;nbsp;for integration with&amp;nbsp;&lt;a href=&quot;http://www.wink.com/products/kidde-smoke-and-co-alarm/&quot; target=&quot;_blank&quot;&gt;Kidde Connected Smoke and CO Alarms&lt;/a&gt;).&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;b&gt;[Intermediate Hubs]&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p4&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;a href=&quot;http://www.logitech.com/en-ca/product/harmony-companion?crid=60&quot;&gt;&lt;br /&gt;&lt;span class=&quot;s5&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;a href=&quot;http://www.logitech.com/en-ca/product/harmony-companion?crid=60&quot; target=&quot;_blank&quot;&gt;Logitech Harmony Hub&lt;/a&gt;: Bluetooth LE, IR and WiFi (ZigBee and Z-Wave via&amp;nbsp;&lt;a href=&quot;http://www.logitech.com/en-ca/product/harmony-home-hub-extender&quot; target=&quot;_blank&quot;&gt;Harmony Hub Extender&lt;/a&gt;)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;a href=&quot;http://www.amazon.com/Amazon-SK705DI-Echo/dp/B00X4WHP5E#tech&quot; target=&quot;_blank&quot;&gt;Amazon Echo&lt;/a&gt;: Bluetooth LE and WiFi&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;b&gt;Hubs to consider&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;We use many hubs in our research facility, but Insteon and&amp;nbsp;&lt;a href=&quot;http://www.wink.com/&quot; target=&quot;_blank&quot;&gt;Wink&lt;/a&gt;&amp;nbsp;hub are among two of our favorites. Despite all the negative things people wrote about this hub early on, we find this first generation hub is really quite stable as long as you keep it at least 3 feet away from your WiFi router. The initial WiFi setup was tricky, but once you understand the timing required, it&#39;s pretty simple and it&#39;s not something you have to do all the time. We&#39;re also big fans of Insteon. Their products are well made, respond very quickly and they&#39;re very consistent. Initial setup can be weird and a pain at times, but once you get the hub online, adding products is as simple as pressing a button. No need to walk around with the hub to set things up.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;You may not think of&amp;nbsp;&lt;a href=&quot;http://www.logitech.com/en-ca/product/harmony-companion?crid=60&quot; target=&quot;_blank&quot;&gt;Logitech Harmony&lt;/a&gt;&amp;nbsp;when building a smart home, but this is a very important hub to bridge connections between devices.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNrzGcCuLEPIWaEMPwYy9nR-kQdmbWgNA5_5PwKfEKV_qHDvgQWHwPQrXoWZj_ZsbgA0Uxxrg8On5jPer9tFZsnWUXq1V86jfZIJL-Tc685cyS3U5I60xR5brjSRJ7ZBsNsxjp44VJLeL5/s1600/Harmony+Hub.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;187&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNrzGcCuLEPIWaEMPwYy9nR-kQdmbWgNA5_5PwKfEKV_qHDvgQWHwPQrXoWZj_ZsbgA0Uxxrg8On5jPer9tFZsnWUXq1V86jfZIJL-Tc685cyS3U5I60xR5brjSRJ7ZBsNsxjp44VJLeL5/s200/Harmony+Hub.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;s1&quot;&gt;They support connection and control of Nest, Ecobee, Insteon, Philips Hue,&amp;nbsp;&lt;a href=&quot;http://www.hunterdouglas.com/operating-systems/powerview-motorization&quot; target=&quot;_blank&quot;&gt;Hunter Douglas&lt;/a&gt;, Samsung SmartThings, Lutron Smart Bridge, Honeywell, Rheem, Lifx Bulbs, and certain WiFi devices like Belkin WeMo and the&amp;nbsp;&lt;a href=&quot;http://august.com/products/august-connect/&quot; target=&quot;_blank&quot;&gt;August Smart Lock Connect&lt;/a&gt;&amp;nbsp;bridge. In addition, they also offer ZigBee and Z-Wave compatibility by attaching a&amp;nbsp;&lt;a href=&quot;http://www.logitech.com/en-ca/product/harmony-home-hub-extender&quot; target=&quot;_blank&quot;&gt;Harmony Hub Extender&lt;/a&gt;.&amp;nbsp;&lt;a href=&quot;https://ifttt.com/&quot; target=&quot;_blank&quot;&gt;IFTTT&lt;/a&gt;&amp;nbsp;scripts can also be used to activate Harmony Hub Activities. They allow time-based activation, scheduling and grouping to create &quot;Activities&quot; that are similar to scenes used by other hubs. The ability to tie your AV control together with other home automation products is especially impressive when you control it all by voice. In our setup, the&amp;nbsp;&lt;a href=&quot;http://www.amazon.com/Amazon-SK705DI-Echo/dp/B00X4WHP5E#tech&quot; target=&quot;_blank&quot;&gt;Amazon Echo&lt;/a&gt;&amp;nbsp;handles this task.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;If you&#39;re into tinkering and custom scripts, the&amp;nbsp;&lt;a href=&quot;https://www.smartthings.com/&quot; target=&quot;_blank&quot;&gt;Samsung SmartThings&lt;/a&gt;&amp;nbsp;hub is quite powerful and has a large user base.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP7cD5EeFaSWvDUQi6NbEf6rLoOXumTyFzq87NxNBkiE4oSOdP7T-x-FaxosDt5Y4ih61ppF6NbRRK9MfQVzMYhuPaWFb6pibFhPsppBUx3ObuKaQHTBFWWt9M8yApk5-MSPg3OdFooAQF/s1600/smart+things+hub.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;170&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP7cD5EeFaSWvDUQi6NbEf6rLoOXumTyFzq87NxNBkiE4oSOdP7T-x-FaxosDt5Y4ih61ppF6NbRRK9MfQVzMYhuPaWFb6pibFhPsppBUx3ObuKaQHTBFWWt9M8yApk5-MSPg3OdFooAQF/s200/smart+things+hub.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;s1&quot;&gt;The latest version has local control, so even if internet access goes down, you can still control your devices. A recent announcement from Wink stated their hubs are slated to also get local control in the next update. All the other devices we&#39;ve mentioned with the exception of Bluetooth, need internet connection for a user to control devices from an app, but local control at the light switches works even if the hub is unplugged. In other words, they survive the &quot;babysitter test&quot; since they are familiar looking wall switches and anyone can operate them without any training or prior experience. The Insteon and Wink hubs will also continue to control device timers even when the internet is offline.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;b&gt;What about home security?&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Of course we didn&#39;t forget. It&#39;s the most popular use case for the internet of things. We&#39;ll go into more detail in a later post, but we would advise that you strongly consider a connected stand-alone security system, the one exception is&amp;nbsp;&lt;a href=&quot;https://www.smartthings.com/uses/security&quot; target=&quot;_blank&quot;&gt;SmartThings&lt;/a&gt;&amp;nbsp;which gets very high ratings as a connected alarm. However, we feel the system that will protect you, your family and your valuables should do just one thing and do it well. Leave the lighting control, leak detectors and other inputs to the smart home hubs to handle. There are several good choices out there like&amp;nbsp;&lt;a href=&quot;https://ismartalarm.com/us/&quot; target=&quot;_blank&quot;&gt;iSmart Alarm&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.scoutalarm.com/&quot; target=&quot;_blank&quot;&gt;Scout&lt;/a&gt;, and&amp;nbsp;&lt;a href=&quot;http://oomihome.com/&quot; target=&quot;_blank&quot;&gt;Oomi&lt;/a&gt;. All are connected, all are relatively new to the scene.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;b&gt;How about connected smoke alarms?&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgD4bVxakFnGCaWpRjS6eccihGbrhPnnEsFwNqQZbaRhTVVQzv_xvmOq9m6C73qs0dBmaEF5t_rvHMIRjS6YnWC7x8BCyhvTDubrZNh2sR81Ksax4JlTbJhd1e1uHn-z1cE4G5DnpqJtUtl/s1600/Nest+Protect.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgD4bVxakFnGCaWpRjS6eccihGbrhPnnEsFwNqQZbaRhTVVQzv_xvmOq9m6C73qs0dBmaEF5t_rvHMIRjS6YnWC7x8BCyhvTDubrZNh2sR81Ksax4JlTbJhd1e1uHn-z1cE4G5DnpqJtUtl/s1600/Nest+Protect.jpg&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;s1&quot;&gt;Hands down it&#39;s still the&amp;nbsp;&lt;a href=&quot;https://nest.com/smoke-co-alarm/meet-nest-protect/&quot; target=&quot;_blank&quot;&gt;Nest Protect v2&lt;/a&gt;. No other manufacturer offers as many features in a single smoke/CO alarm. In fact, it&#39;s such a good value for the protection and peace of mind you get, we suggest you just go buy one today, your lives are worth it. To keep cost low for the rest of the house where you just need a regular smoke alarm, you can receive notifications via&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;any&lt;/span&gt;&lt;span class=&quot;s1&quot;&gt;&amp;nbsp;phone with the&amp;nbsp;&lt;a href=&quot;http://shop.leeo.com/pages/about-leeo-smart-alert&quot; target=&quot;_blank&quot;&gt;Leeo Smart Alert Nightlight&lt;/a&gt;. We like this more than most other options since it will phone any regular number. No smartphone data plan required to be notified of a smoke or CO emergency in your home.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Want more? There&#39;s tons more, but for now these are the basics to help point you in the right direction and clear up some of the confusion. Keep checking back. We&#39;ll be telling you more about connected security solutions, Wink&#39;s revival and return from the brink,&amp;nbsp;&lt;a href=&quot;http://www.amazon.com/Amazon-SK705DI-Echo/dp/B00X4WHP5E#tech&quot; target=&quot;_blank&quot;&gt;Amazon Echo&lt;/a&gt;&amp;nbsp;in detail, connected multi-use buttons for your smart home and more.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;As always, you can find me on Twitter&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://twitter.com/dougkrug&quot; target=&quot;_blank&quot;&gt;@dougkrug&lt;/a&gt;&lt;span class=&quot;s1&quot;&gt;&amp;nbsp;posting and exchanging ideas around the latest news and development in IoT and smart home innovations.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;s1&quot;&gt;&lt;b&gt;|Update - February 2017|&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;As can be expected, a lot has changed in a short time.&lt;br /&gt;
&lt;br /&gt;
•&amp;nbsp;&lt;a href=&quot;https://support.apple.com/en-ca/HT204903&quot; target=&quot;_blank&quot;&gt;Apple HomeKit&lt;/a&gt;&amp;nbsp;is rolled into iOS 10 making it easier to use than before and the choice of devices and functionality continues to improve, albeit at a slower and some would argue, more cautious rate than devices that operated via both Android and iOS without HomeKit compatibility.&lt;br /&gt;
&lt;br /&gt;
•&amp;nbsp;&lt;a href=&quot;http://www.amazon.com/Amazon-SK705DI-Echo/dp/B00X4WHP5E#tech&quot; target=&quot;_blank&quot;&gt;Amazon Echo&lt;/a&gt;&amp;nbsp;now has competition from&amp;nbsp;&lt;a href=&quot;https://madeby.google.com/home/&quot; target=&quot;_blank&quot;&gt;Google Home&lt;/a&gt;. Although the edge still goes to Amazon as far as smart home control is concerned, the massive data and search capabilities behind Google are a serious threat to their market lead if Google is as open to developers and the proliferation of their voice services on non-Google hardware as Amazon has been with&amp;nbsp;&lt;a href=&quot;https://developer.amazon.com/alexa-voice-service&quot; target=&quot;_blank&quot;&gt;AVS&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
•&amp;nbsp;&lt;a href=&quot;https://ifttt.com/&quot; target=&quot;_blank&quot;&gt;IFTTT&lt;/a&gt;&amp;nbsp;now has both stiff competition, and at the same time, collaboration from&amp;nbsp;&lt;a href=&quot;https://www.stringify.com/&quot; target=&quot;_blank&quot;&gt;Stringify&lt;/a&gt;, a free service that allows flows with multiple input and output variables, triggers and actions. To our great delight,&amp;nbsp;&lt;a href=&quot;https://www.stringify.com/&quot; target=&quot;_blank&quot;&gt;Stringify&lt;/a&gt;&amp;nbsp;has acted on our advice to partner with&amp;nbsp;&lt;a href=&quot;https://ifttt.com/&quot; target=&quot;_blank&quot;&gt;IFTTT&lt;/a&gt;, allowing input from, and output to&amp;nbsp;&lt;a href=&quot;https://ifttt.com/&quot; target=&quot;_blank&quot;&gt;IFTTT&lt;/a&gt;&amp;nbsp;applets. With this powerful partnership and support for nearly all the major smart home hubs and devices,&amp;nbsp;&lt;a href=&quot;https://www.stringify.com/&quot; target=&quot;_blank&quot;&gt;Stringify&lt;/a&gt;&amp;nbsp;is one of the most powerful means to connect otherwise disparate devices in your smart home. Like&amp;nbsp;&lt;a href=&quot;https://ifttt.com/&quot; target=&quot;_blank&quot;&gt;IFTTT&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.stringify.com/&quot; target=&quot;_blank&quot;&gt;Stringify&lt;/a&gt;&amp;nbsp;operates from the cloud, so there is no need to have an app running all the time.&lt;br /&gt;
&lt;br /&gt;
•&amp;nbsp;&lt;a href=&quot;http://www.casetawireless.com/Pages/ProProducts.aspx&quot; target=&quot;_blank&quot;&gt;Lutron Caséta&lt;/a&gt;&amp;nbsp;now supports&amp;nbsp;&lt;a href=&quot;https://www.smartthings.com/&quot; target=&quot;_blank&quot;&gt;Samsung SmartThings&lt;/a&gt;;&amp;nbsp;&lt;a href=&quot;http://www.zigbee.org/zigbee-alliance-creating-end-to-end-iot-product-development-solution-that-brings/&quot; target=&quot;_blank&quot;&gt;ZigBee Alliance&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;https://www.threadgroup.org/&quot; target=&quot;_blank&quot;&gt;Thread Group&#39;s IP Network Protocol&lt;/a&gt;&amp;nbsp;have joined forces to bring ubiquity to Thread and potentially better security to ZigBee in the future; and the Z-Wave alliance introduced the&amp;nbsp;&lt;a href=&quot;http://z-wavealliance.org/z-wave_plus_certification/&quot; target=&quot;_blank&quot;&gt;Z-Wave Plus&lt;/a&gt;&amp;nbsp;certification program to help manufacturers and consumers move to more secure devices utilizing the Next Gen, Z-Wave 500 Series capabilities.&lt;br /&gt;
&lt;br /&gt;
•&amp;nbsp;&lt;a href=&quot;http://www.wink.com/&quot; target=&quot;_blank&quot;&gt;Wink 2&lt;/a&gt;&amp;nbsp;is out and now has Ethernet, WiFi and Bluetooth LE built-in. In addition to local control so your devices can still be controlled locally if your internet goes down, Wink has continued to expand their device support, which now includes&amp;nbsp;&lt;a href=&quot;http://august.com/&quot; target=&quot;_blank&quot;&gt;August Smart Lock&lt;/a&gt;&amp;nbsp;via their&amp;nbsp;&lt;a href=&quot;http://august.com/products/august-connect/&quot; target=&quot;_blank&quot;&gt;August Connect&lt;/a&gt;&amp;nbsp;bridge. We&#39;re particularly pleased with this addition because it allows the exceptional August HomeKit Smart Lock to be controlled by&amp;nbsp;&lt;a href=&quot;http://www.wink.com/&quot; target=&quot;_blank&quot;&gt;Wink&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.stringify.com/&quot; target=&quot;_blank&quot;&gt;Stringify&lt;/a&gt;, and&amp;nbsp;&lt;a href=&quot;https://flic.io/&quot; target=&quot;_blank&quot;&gt;Flic&lt;/a&gt;&amp;nbsp;buttons. Flic recently added support for Wink via&amp;nbsp;&lt;a href=&quot;http://blog.wink.com/wink-blog/2016/1/12/how-to-create-a-wink-shortcut&quot; target=&quot;_blank&quot;&gt;Wink Shortcuts&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
• Amazon now allows developers to integrate any smart home device directly to&amp;nbsp;&lt;a href=&quot;https://developer.amazon.com/alexa-voice-service&quot; target=&quot;_blank&quot;&gt;Alexa Voice Services&lt;/a&gt;&amp;nbsp;via the&amp;nbsp;&lt;a href=&quot;http://www.amazon.com/Amazon-SK705DI-Echo/dp/B00X4WHP5E#tech&quot; target=&quot;_blank&quot;&gt;Echo&lt;/a&gt;&amp;nbsp;or any device that uses AVS. Most notably, you can now control your AV devices with&amp;nbsp;&lt;a href=&quot;http://www.logitech.com/en-ca/product/harmony-companion?crid=60&quot; target=&quot;_blank&quot;&gt;Logitech Harmony&lt;/a&gt;&amp;nbsp;Hub as if they were connected smart home devices, without using the nomenclature &quot;Alex Ask...&quot; or &quot;Alex Tell...&quot;. As a side note, Logitech has added an Alexa Skill to &quot;Ask Harmony&quot; to expand voice control even further with commands like Pause, Play, Fast Forward, lower the volume, etc. and we&#39;re big fans of this new capability.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/7186479307706799664/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2016/01/how-to-choose-diy-smart-home-products.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/7186479307706799664'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/7186479307706799664'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2016/01/how-to-choose-diy-smart-home-products.html' title='How-to: Choose DIY Smart Home Products'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii4koe834fel8Eq9WdPh4arN4M9VKomY0JD77gw0j9w04XBuNhzUqx5uzeb5-9pZcqNjAyYCGJVzlSWtDU0_0QZ-UPpeCpfjVBk9tDbTEaSYGRO2ihWLOB0OxvgozMxZWBdYGvTC_NBlUT/s72-c/Insteon+Hub+%2528HomeKit%2529+-+Product+Family.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-474201873139946599</id><published>2015-03-10T17:52:00.000-04:00</published><updated>2017-03-11T15:36:55.109-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Amazon"/><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><category scheme="http://www.blogger.com/atom/ns#" term="Apple"/><category scheme="http://www.blogger.com/atom/ns#" term="Best Buy"/><category scheme="http://www.blogger.com/atom/ns#" term="D-Link"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="Home Depot"/><category scheme="http://www.blogger.com/atom/ns#" term="HomeKit"/><category scheme="http://www.blogger.com/atom/ns#" term="Hub"/><category scheme="http://www.blogger.com/atom/ns#" term="Insteon"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet of Things"/><category scheme="http://www.blogger.com/atom/ns#" term="iOS"/><category scheme="http://www.blogger.com/atom/ns#" term="iPhone"/><category scheme="http://www.blogger.com/atom/ns#" term="Lowes"/><category scheme="http://www.blogger.com/atom/ns#" term="Nest"/><category scheme="http://www.blogger.com/atom/ns#" term="Revolv"/><category scheme="http://www.blogger.com/atom/ns#" term="Samsung"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="Smart Home"/><category scheme="http://www.blogger.com/atom/ns#" term="SmartThings"/><title type='text'>Entering the Smart Home</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
Chances are, if you’ve started to hear or read about “The Smart Home”, you’ve learned something about controlling your&amp;nbsp;&lt;a href=&quot;https://nest.com/&quot; target=&quot;_blank&quot;&gt;thermostat&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href=&quot;https://www.okidokeys.com/&quot; target=&quot;_blank&quot;&gt;unlocking your house from a smartphone&lt;/a&gt;. But what you probably haven’t been exposed to, is the idea that you can interact with your entire home. The technology already exists to enable your smart home devices to react based on which occupant has arrived home or an input received from sensors and detectors. Actions such as opening a&amp;nbsp;&lt;a href=&quot;https://www.okidokeys.com/items/18-okidokeys-smart-gate.html&quot; target=&quot;_blank&quot;&gt;gate&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href=&quot;https://www.okidokeys.com/items/9-smart-garage.html&quot; target=&quot;_blank&quot;&gt;garage door&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.okidokeys.com/packages/16-okidokeys-access-pack.html&quot; target=&quot;_blank&quot;&gt;unlocking the entry door&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://www.insteon.com/wall-switches&quot; target=&quot;_blank&quot;&gt;turning on the lights to a pre-set level&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://www.sonos.com/&quot; target=&quot;_blank&quot;&gt;playing their favorite music&lt;/a&gt;&amp;nbsp;and setting the&amp;nbsp;&lt;a href=&quot;https://www.ecobee.com/&quot; target=&quot;_blank&quot;&gt;temperature to their preference&lt;/a&gt;&amp;nbsp;are trivial when compared with what is possible today.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmxOZqq3nUxgUpAzobXIlLoJefJdgX3gZVgBMFjJZlr-IB7E0GgCScmKp4syuP6ueGPL0H_5EgBxjHNpseAslPjajF27sVbWPbw8HmpD-am76tL3AD5aTbBmF2iP_tqjLmTcQk90tjTQmh/s1600/Screenshot+-+Devices.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmxOZqq3nUxgUpAzobXIlLoJefJdgX3gZVgBMFjJZlr-IB7E0GgCScmKp4syuP6ueGPL0H_5EgBxjHNpseAslPjajF27sVbWPbw8HmpD-am76tL3AD5aTbBmF2iP_tqjLmTcQk90tjTQmh/s1600/Screenshot+-+Devices.jpg&quot; width=&quot;113&quot; /&gt;&lt;/a&gt;One problem; Only hobbyist and the manufacturers for luxury markets have expertise to bring all this together at the moment. The standards needed to help foster smart market growth don’t exist yet, but that’s truly an over-simplification of the complex barriers the so-called “Internet of Things” industry is trying to solve.&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Today, consumers exploring smart home products in their local Best Buy, Home Depot, Lowes or on Amazon are presented with a confusing range of devices that often do not play well together, if at all. Strangely, industry members are addressing this issue by creating&amp;nbsp;&lt;a href=&quot;http://openinterconnect.org/&quot; target=&quot;_blank&quot;&gt;consortiums&lt;/a&gt;, formed of members holding patents for opposing connected-device communications technologies. At first glance, someone looking to make their home “smart” may not realize they need to choose a team.&lt;br /&gt;
&lt;br /&gt;
Let&#39;s say you shell out $249 for a WiFi connected&amp;nbsp;&lt;a href=&quot;https://nest.com/&quot; target=&quot;_blank&quot;&gt;Nest&lt;/a&gt;&amp;nbsp;thermostat. Not only is it great for family members with Android phones, it works with iPhones and a host of other products, all thanks to the “&lt;a href=&quot;https://nest.com/support/article/What-is-Works-with-Nest&quot; target=&quot;_blank&quot;&gt;Works with Nest&lt;/a&gt;” developer program. Great! Now the iPhone users in the house may have also heard about Apple’s&amp;nbsp;&lt;a href=&quot;https://developer.apple.com/homekit/&quot; target=&quot;_blank&quot;&gt;HomeKit&lt;/a&gt;&amp;nbsp;project, where Apple will attempt to work with several companies to bring this fractured industry of smart home startups and established manufacturers together.&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;Works with Nest right? NO&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
With Google having purchased Nest in 2014, it is of no surprise they are not invited to hang with HomeKit. So if you want to crash this house party, you&#39;re going to need to bring someone who knows and gets along with both of them.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;Enter the “Hub”&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjH0PLGl2nWZbzep74eESc6Z7UdHUaS7T5iX3g6fn3zYiz2GzwnQaK9PC8NkW30frbAsMHTc6-9N-n4hv769plYTLUsLq7_U85Cwms1e9mn1FH0Cu9FO6Hp9NPThpCarYUl_3jiRNSMC13y/s1600/Hub+Pro+-+Hero.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;126&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjH0PLGl2nWZbzep74eESc6Z7UdHUaS7T5iX3g6fn3zYiz2GzwnQaK9PC8NkW30frbAsMHTc6-9N-n4hv769plYTLUsLq7_U85Cwms1e9mn1FH0Cu9FO6Hp9NPThpCarYUl_3jiRNSMC13y/s1600/Hub+Pro+-+Hero.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;A hub is a box that connects to your WiFi network and bridges the gap between the various technologies. Increasingly, it also connects to the cloud so you can more securely access your smart hub from anywhere. To date there is only one company capable of merging Apple’s vision of the smart home with Google. At the 2015 Consumer Electronics Show,&amp;nbsp;&lt;a href=&quot;http://www.insteon.com/&quot; target=&quot;_blank&quot;&gt;Insteon&lt;/a&gt;, a 10 year veteran in the smart home industry announced their&amp;nbsp;&lt;a href=&quot;http://www.insteon.com/insteon-hub-pro/&quot; target=&quot;_blank&quot;&gt;$149 Hub Pro&lt;/a&gt;&amp;nbsp;that supports Apple HomeKit. Since the&amp;nbsp;&lt;a href=&quot;http://www.insteon.com/insteon-hub&quot; target=&quot;_blank&quot;&gt;current Insteon Hub&lt;/a&gt;&amp;nbsp;already supports control of the Nest Learning Thermostat, it&#39;s a reasonable assumption that the Apple HomeKit version will too, however Insteon declined to comment on the capabilities of their yet to be released Hub Pro, beyond the&amp;nbsp;&lt;a href=&quot;http://www.insteon.com/press-releases-blog/2015/01/06/insteon-announces-apple-homekit-app-and-hub&quot; target=&quot;_blank&quot;&gt;official press release&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
With the soon to be available&amp;nbsp;&lt;a href=&quot;https://www.apple.com/watch/&quot; target=&quot;_blank&quot;&gt;Apple Watch&lt;/a&gt;, Apple also has a new&lt;br /&gt;
tool that adds interesting possibilities for owners of HomeKit compatible iOS devices and a HomeKit compatible Insteon Pro Hub. &amp;nbsp;From your wrist, you could use voice activation,&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Geo-fence&quot; target=&quot;_blank&quot;&gt;geo-fencing location services&lt;/a&gt;, and touch control to interact with your smart home from a single, secure interface. This could potentially simplify and secure two-way interaction with door locks, lights, thermostats, gate and garage openers, cameras, sensors and alarm systems from anywhere in the world.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;
Apple is not the only company trying to bridge the divide. Samsung also purchased smart home startup&amp;nbsp;&lt;a href=&quot;http://www.smartthings.com/&quot; target=&quot;_blank&quot;&gt;SmartThings&lt;/a&gt;, a hub manufacture that tries to bridge several communication types. Staples, though a partnership with D-Link, has the&amp;nbsp;&lt;a href=&quot;http://www.staples.com/sbd/cre/marketing/staples-connect/&quot; target=&quot;_blank&quot;&gt;Connect&lt;/a&gt;&amp;nbsp;hub which, similar to SmartThings, connects multiple device types. Google also purchased the intellectual property from startup&amp;nbsp;&lt;a href=&quot;http://revolv.com/&quot; target=&quot;_blank&quot;&gt;Revolv&lt;/a&gt;&amp;nbsp;under the Nest brand, which until they closed down operations, had one of the most intriguing hubs around, promising control of multiple vendor smart devices with no less than eight different communications types from a single box.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;Security&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Unfortunately, when technology is built as quickly as possible, for the lowest price possible, security is not at the forefront. Good security is hard to get right, and many vendors try to patch it in after the fact. According to sources, security has been a cornerstone of Apple HomeKit from the start, which is good news if you’re an iOS user. Devices compatible with Apple HomeKit require special silicon chips to make them compliant with Apple&#39;s security requirements. But what if you have an Android phone, is the secure smart home possible? Turns out there’s both good news and no news.&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;p1&quot;&gt;
Next time I’ll go into more detail about the security issues, the current progress, what’s still missing and steps you should take to protect your privacy as the Internet of Everything starts to enter your home.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Interested in joining the discussion? Leave me a comment or send me a tweet&amp;nbsp;&lt;a href=&quot;https://twitter.com/dougkrug&quot; target=&quot;_blank&quot;&gt;@dougkrug&lt;/a&gt;. I&#39;d love to hear your perspective about what you think this smart future should look like.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/474201873139946599/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2015/03/entering-smart-home.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/474201873139946599'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/474201873139946599'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2015/03/entering-smart-home.html' title='Entering the Smart Home'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmxOZqq3nUxgUpAzobXIlLoJefJdgX3gZVgBMFjJZlr-IB7E0GgCScmKp4syuP6ueGPL0H_5EgBxjHNpseAslPjajF27sVbWPbw8HmpD-am76tL3AD5aTbBmF2iP_tqjLmTcQk90tjTQmh/s72-c/Screenshot+-+Devices.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-4894584316118686063</id><published>2015-01-05T13:16:00.000-05:00</published><updated>2017-03-11T15:34:01.509-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Airtame"/><category scheme="http://www.blogger.com/atom/ns#" term="Amazon"/><category scheme="http://www.blogger.com/atom/ns#" term="Apple"/><category scheme="http://www.blogger.com/atom/ns#" term="August"/><category scheme="http://www.blogger.com/atom/ns#" term="Blumoo"/><category scheme="http://www.blogger.com/atom/ns#" term="CES 2015"/><category scheme="http://www.blogger.com/atom/ns#" term="CES2015"/><category scheme="http://www.blogger.com/atom/ns#" term="Consumer Electronics Show"/><category scheme="http://www.blogger.com/atom/ns#" term="Duracell"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="Harmony"/><category scheme="http://www.blogger.com/atom/ns#" term="HomeKit"/><category scheme="http://www.blogger.com/atom/ns#" term="Logitech"/><category scheme="http://www.blogger.com/atom/ns#" term="Okidokeys"/><category scheme="http://www.blogger.com/atom/ns#" term="Powermat"/><category scheme="http://www.blogger.com/atom/ns#" term="Samsung"/><category scheme="http://www.blogger.com/atom/ns#" term="Somfy"/><category scheme="http://www.blogger.com/atom/ns#" term="Yves Behar"/><title type='text'>2014 Tech in Review: What Made the Cut</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
The 2014 Consumer Electronics Show (CES) brought a lot of interesting technology to the surface.&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
As we head into CES 2015 (The Consumer Electronics Show), lets take a look back at some consumer tech that caught our eye and a reality check. Some surprise contenders have won us over and some still haven’t left the manufacturer.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;BLUMOO&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmiZQMYa7BFh3m3dNUzttvEvhRJmgdZuWFZXse-TDEfqJdlFOXXRb8ScLSFSc5Fnp3fp2TADouUZbEqtboQH2TKIp6pX2Y97rovbhVUpWMH00XALlsXYHmJhY4DdsDB42z8Irs79FcL1oS/s1600/BLUMOO_0714_FINAL--4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;133&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmiZQMYa7BFh3m3dNUzttvEvhRJmgdZuWFZXse-TDEfqJdlFOXXRb8ScLSFSc5Fnp3fp2TADouUZbEqtboQH2TKIp6pX2Y97rovbhVUpWMH00XALlsXYHmJhY4DdsDB42z8Irs79FcL1oS/s1600/BLUMOO_0714_FINAL--4.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
The now $99 hub that turns your smart device into a universal remote and bluetooth streamer. But with remote giant Logitech having nearly the same capabilities in a better looking app, plus either a physical keyboard/mouse/remote, dedicated remote or both, it’s hard to still want to choose&amp;nbsp;&lt;a href=&quot;http://www.blumoo.com/&quot; target=&quot;_blank&quot;&gt;BLUMOO&lt;/a&gt;. The&amp;nbsp;&lt;a href=&quot;http://www.logitech.com/en-ca/harmony-remotes&quot; target=&quot;_blank&quot;&gt;Harmony Hub&lt;/a&gt;&amp;nbsp;product line may not include steaming audio, but BLUMOO can’t control home automation products and that’s a significant advantage for Logitech in the Internet of Things.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;http://www.blumoo.com/&quot;&gt;http://www.blumoo.com/&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;AIRTAME&amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7KdooNcGrUnVMNj4uWhY06PuRzYtxTaPl_C6ZW93JzdU_khvCU_NM3Y1uGpaFy8_Y-9y2C7AjLEAHVShR_-kEeg85hEcCXiIgRpVxYCHX8idkBI_cVC6wThqH6IWz9DjaJsLGU0_di0T2/s1600/airtameone+dongle.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7KdooNcGrUnVMNj4uWhY06PuRzYtxTaPl_C6ZW93JzdU_khvCU_NM3Y1uGpaFy8_Y-9y2C7AjLEAHVShR_-kEeg85hEcCXiIgRpVxYCHX8idkBI_cVC6wThqH6IWz9DjaJsLGU0_di0T2/s1600/airtameone+dongle.png&quot; width=&quot;147&quot; /&gt;&lt;/a&gt;I was intrigued by this video streaming competitor to&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2012/10/apple-tv-unboxed.html#.VKrScb_F-Q0&quot; target=&quot;_blank&quot;&gt;Apple&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2013/07/chromecast-redefines-hdtv-streaming.html#.VKrSmb_F-Q0&quot; target=&quot;_blank&quot;&gt;Google&lt;/a&gt;&amp;nbsp;and others, but a year after debut, they are still tweaking. It’s not going to turn out well for them I’m afraid, as they are manually modifying each and every one of the prototypes. To effectively compete, they really needed to be in full production 6 months ago. Too many lower priced options out there to keep their $150, unavailable product in the game I fear.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://airtame.com/&quot;&gt;https://airtame.com/&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;POWERMAT&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
With P&amp;amp;G’s money and the Duracell brand recognition backing them, Powermat Technologies’&amp;nbsp;&lt;a href=&quot;http://powermat.com/how-it-works/&quot; target=&quot;_blank&quot;&gt;$10 charge rings&lt;/a&gt;&amp;nbsp;that can also be borrowed at Starbucks, started rolling out in November at San Francisco locations. However battery, processor and component improvements are changing the need and this stop gap solution may never see a wide spread rollout. It’s popularity remains to be seen, but with inexpensive and sometimes free portable batteries popping up everywhere, expect the lifespan of this device to be short.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;http://powermat.com/announcements/starbucks-begins-national-roll-powermat-wireless-charging-san-francisco/&quot;&gt;http://powermat.com/how-it-works/&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;AUGUST&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixbQVMDAAIVf7dYNuojIJZG5QTjDNRnnDKTmWfv4ifKNIyc7R4fveqEXDQvop1ZV-7jG9615_Z9fxEueXHumNQRKxHlNNPgho6TfYNr6F6-Q94IMZoKN86yrsPD2QNZeUVLtORX9kV_GFa/s1600/LockOnDoor_HandComp.R4.1-F.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;149&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixbQVMDAAIVf7dYNuojIJZG5QTjDNRnnDKTmWfv4ifKNIyc7R4fveqEXDQvop1ZV-7jG9615_Z9fxEueXHumNQRKxHlNNPgho6TfYNr6F6-Q94IMZoKN86yrsPD2QNZeUVLtORX9kV_GFa/s1600/LockOnDoor_HandComp.R4.1-F.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;s1&quot;&gt;After a lengthy delay,&amp;nbsp;&lt;a href=&quot;http://www.august.com/&quot; target=&quot;_blank&quot;&gt;August&amp;nbsp;&lt;/a&gt;began shipping their smart lock partly designed by&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;Yves Béhar. I cancelled my own pre-order after the company failed to ship by August after announcing further delays. Turned out they were preparing to stock Apple stores and Amazon. Aside from saving $50, pre-order meant nothing as many did not receive their pre-orders, but could walk into an Apple Store and buy one. Early reviews have been mixed and the installation reportedly finicky.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p4&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;a href=&quot;http://www.august.com/&quot;&gt;http://www.august.com/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p4&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;b&gt;OKIDOKEYS&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;Silly name aside,&amp;nbsp;&lt;a href=&quot;https://www.okidokeys.com/&quot; target=&quot;_blank&quot;&gt;OKIDOKEYS&lt;/a&gt;&amp;nbsp;which also appeared at CES 2014 flew largely under the radar of most tech journalists. Their parent company OpenWays is an experienced manufacturer that supplies secure room locks and hospitality software to hotels worldwide. For $200 on Amazon, they offer two different packages with 3 covers of your choice to match your existing door hardware, or a paint your own option. This truly easy to install smart lock does everything they claim, and can be opened by any cell phone or a NFC (Near Field Communication) fob, not just Bluetooth 4.0 enable smart phones with their $250 package. There’s also a Smart-Gateway option for remote operation and connected home integration, Smart-Gate openers, Smart-Garage openers, more optional covers, upcoming integration with&amp;nbsp;&lt;a href=&quot;https://developer.apple.com/homekit/&quot; target=&quot;_blank&quot;&gt;Apple HomeKit&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://www.logitech.com/en-ca/harmony-remotes&quot; target=&quot;_blank&quot;&gt;Logitech Harmony Hub&lt;/a&gt;, and geo-location unlocking additions.&amp;nbsp;&lt;a href=&quot;https://www.okidokeys.com/&quot; target=&quot;_blank&quot;&gt;OKIDOKEYS&lt;/a&gt;&amp;nbsp;is the only manufacturer to date that specifically states their product uses strong 256bit AES encryption, instead of just stating &quot;same as bank encryption&quot; or &quot;a company secret&quot; as competitors have.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;br /&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgU75dqSysCOJLBb4DFb8vBK6FlIT8-JdlfzFRVKD3_DFfV-X8Vt9-DAkfsjXkQLpJLxy4bG7NokFk8pSWDhCDDZ0gJscOXxqE8LacmD-_q8SxZlSXLvuFjxCuibHTMBjv3Sy2fMFQBBJfa/s1600/OKIDOKEYS+Classic+Connect-Pack.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;154&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgU75dqSysCOJLBb4DFb8vBK6FlIT8-JdlfzFRVKD3_DFfV-X8Vt9-DAkfsjXkQLpJLxy4bG7NokFk8pSWDhCDDZ0gJscOXxqE8LacmD-_q8SxZlSXLvuFjxCuibHTMBjv3Sy2fMFQBBJfa/s1600/OKIDOKEYS+Classic+Connect-Pack.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;a href=&quot;https://www.okidokeys.com/&quot;&gt;https://www.okidokeys.com/&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgU75dqSysCOJLBb4DFb8vBK6FlIT8-JdlfzFRVKD3_DFfV-X8Vt9-DAkfsjXkQLpJLxy4bG7NokFk8pSWDhCDDZ0gJscOXxqE8LacmD-_q8SxZlSXLvuFjxCuibHTMBjv3Sy2fMFQBBJfa/s1600/OKIDOKEYS+Classic+Connect-Pack.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Interested in what&#39;s to come in 2015? Follow me&amp;nbsp;on Twitter&amp;nbsp;&lt;a href=&quot;https://twitter.com/dougkrug&quot; target=&quot;_blank&quot;&gt;@dougkrug&lt;/a&gt;&amp;nbsp;as the doors open on CES 2015, January 6. We&#39;ll be following the Internet of Things in the connected home closely, bringing you updates on these and other yet unannounced new technology for your Smart Home and Office.&lt;br /&gt;
&lt;br /&gt;
[Update 2017]&lt;br /&gt;
&lt;br /&gt;
I don&#39;t usually go back and update pieces like this, but I felt it would be of interest to some.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://www.blumoo.com/&quot; target=&quot;_blank&quot;&gt;Blumoo&lt;/a&gt; seems to have closed shop, likely unable to compete with the popular &lt;a href=&quot;https://www.logitech.com/en-ca/product/harmony-hub&quot; target=&quot;_blank&quot;&gt;Logitech Harmony Hub&lt;/a&gt;, which also now controls your smart home too and has great &lt;a href=&quot;https://www.amazon.com/Amazon-Echo-Bluetooth-Speaker-with-WiFi-Alexa/dp/B00X4WHP5E&quot; target=&quot;_blank&quot;&gt;Amazon Echo&lt;/a&gt; integration.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://airtame.com/&quot; target=&quot;_blank&quot;&gt;Airtame&lt;/a&gt; is still around for now, but at double the original offered price and with the streaming options and low cost devices available, I can&#39;t see them surviving much longer.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.powermat.com/&quot; target=&quot;_blank&quot;&gt;Powermat&lt;/a&gt; has continued on with their partnerships, but it seems pretty clear that companies like Apple and Samsung are targeting completely new ways of charging that will make this type of inductive charging obsolete in the next few years.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://august.com/&quot; target=&quot;_blank&quot;&gt;August&lt;/a&gt; has continued their development and partnerships. Their second generation smart lock is excellent and I now own one myself. They have a remote connect module available, along with a wireless keypad, doorbell camera and many integration partners, including &lt;a href=&quot;https://www.amazon.com/Amazon-Echo-Bluetooth-Speaker-with-WiFi-Alexa/dp/B00X4WHP5E&quot; target=&quot;_blank&quot;&gt;Amazon Echo&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Okidokeys was purchased by &lt;a href=&quot;https://www.somfysystems.com/&quot; target=&quot;_blank&quot;&gt;Somfy&lt;/a&gt; and their operations and sales are now in France, although they have yet to offer the product for sale again. For now, North American models still work, but there is no guarantee that they will in the future. &lt;a href=&quot;https://www.somfysystems.com/&quot; target=&quot;_blank&quot;&gt;Somfy&lt;/a&gt; has already stopped the registration of the NFC module from North America and will likely stop supporting at least that part in the near future. Auto unlock support has already halted.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: black; font-family: Verdana; font-size: medium; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; margin: 0px; orphans: 2; text-align: start; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/4894584316118686063/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2015/01/2014-tech-in-review-what-made-cut.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/4894584316118686063'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/4894584316118686063'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2015/01/2014-tech-in-review-what-made-cut.html' title='2014 Tech in Review: What Made the Cut'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmiZQMYa7BFh3m3dNUzttvEvhRJmgdZuWFZXse-TDEfqJdlFOXXRb8ScLSFSc5Fnp3fp2TADouUZbEqtboQH2TKIp6pX2Y97rovbhVUpWMH00XALlsXYHmJhY4DdsDB42z8Irs79FcL1oS/s72-c/BLUMOO_0714_FINAL--4.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-4129638262675706193</id><published>2014-08-28T20:23:00.000-04:00</published><updated>2017-03-11T18:07:33.173-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AT&amp;T"/><category scheme="http://www.blogger.com/atom/ns#" term="broadband"/><category scheme="http://www.blogger.com/atom/ns#" term="Clearwire"/><category scheme="http://www.blogger.com/atom/ns#" term="Cogent"/><category scheme="http://www.blogger.com/atom/ns#" term="Comcast"/><category scheme="http://www.blogger.com/atom/ns#" term="Disney"/><category scheme="http://www.blogger.com/atom/ns#" term="encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="fast lane"/><category scheme="http://www.blogger.com/atom/ns#" term="Geo-fence"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="ISP"/><category scheme="http://www.blogger.com/atom/ns#" term="Net Neutrality"/><category scheme="http://www.blogger.com/atom/ns#" term="Netflix"/><category scheme="http://www.blogger.com/atom/ns#" term="peering"/><category scheme="http://www.blogger.com/atom/ns#" term="Qikster"/><category scheme="http://www.blogger.com/atom/ns#" term="streaming"/><category scheme="http://www.blogger.com/atom/ns#" term="Verizon"/><category scheme="http://www.blogger.com/atom/ns#" term="WiFi"/><category scheme="http://www.blogger.com/atom/ns#" term="YouTube"/><title type='text'>Avoiding the Netflix Peering Problem</title><content type='html'>
&lt;br /&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;If your ISP is Verizon, Comcast, AT&amp;amp;T or Clearwire, you may have some of the worst Netflix streaming speeds around. &lt;a href=&quot;https://www.netflix.com/&quot;&gt;&lt;span class=&quot;s2&quot;&gt;Netflix&lt;/span&gt;&lt;/a&gt; traffic now occupies 30% of all internet traffic during primetime hours, so it&#39;s no wonder there&#39;s an issue, but it&#39;s not as simple as demand.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPT6rc_NN2AQUpTrxrFt6NQZTImdzqC7kjeUaQ0o3EP7NhQ6euZ_x0-kL7sjREzT8SCBgNpafTAVZ7Edei6PA2bs2PFQpjvkOmHQiSJBEvGrXvz9vxfrLREZhW3cx30GKQpT5GEDot2siJ/s1600/Internet+Handshake.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPT6rc_NN2AQUpTrxrFt6NQZTImdzqC7kjeUaQ0o3EP7NhQ6euZ_x0-kL7sjREzT8SCBgNpafTAVZ7Edei6PA2bs2PFQpjvkOmHQiSJBEvGrXvz9vxfrLREZhW3cx30GKQpT5GEDot2siJ/s1600/Internet+Handshake.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;b&gt;The Good:&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
With&amp;nbsp;&lt;a href=&quot;https://www.netflix.com/&quot; target=&quot;_blank&quot;&gt;Netflix&lt;/a&gt;&amp;nbsp;coming back strong from the&amp;nbsp;&lt;a href=&quot;http://www.huffingtonpost.com/2011/10/10/qwikster-netflix-mistake_n_1003367.html&quot; target=&quot;_blank&quot;&gt;Qwikster misstep&lt;/a&gt;, cranking out good original shows and&amp;nbsp;&lt;a href=&quot;http://online.wsj.com/news/articles/SB10001424127887323901604578159432752905010&quot; target=&quot;_blank&quot;&gt;Disney deals&lt;/a&gt;&amp;nbsp;for the kids, it&#39;s no wonder they&#39;re occupying the lion&#39;s share of evening internet traffic.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The Bad:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Great for Netflix subscribers, not beneficial at all for ISPs who sell ads and also pay for content to rebroadcast. The amount of data flowing into their networks is unbalanced with Cogent, the Tier 1 bandwidth provider that delivers Netflix to broadband networks like Comcast.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The Ugly:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Netflix struck a deal with Comcast on February 24th, 2014 that gives them a &quot;fast lane&quot;, benefiting Netflix and Comcast customers. Other popular streaming providers are left without a resolution to the problem. Net Neutrality is put at risk; the equation is unbalanced. Pay more and get preferential treatment. A fast lane for some, a slow lane for those that can&#39;t afford to pay the price demanded. Not the free and open internet we&#39;ve come to love.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;A Fix:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Turns out, there&#39;s a relatively simple and inexpensive fix that will avoid all the high-level fighting over peering agreements I&#39;m almost certain most of you don&#39;t care about. You just want to watch Netflix, YouTube and other streaming services without buffering or a low quality picture right?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Use a VPN:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
By connecting through a&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2013/04/unblock-internet-no-streaming.html#.U_5012RdX5Y&quot; target=&quot;_blank&quot;&gt;VPN&lt;/a&gt;&amp;nbsp;or Virtual Private Network, you bypass the normal peering routes so your video streams fast and with higher quality. The second benefit is that because your internet connection through your ISP is encrypted with a VPN, your ISP only sees data flowing. The automatic throttling of streaming traffic they claim they aren&#39;t doing is defeated, and you have a private connection to the internet.&lt;br /&gt;
&lt;br /&gt;
But setting up a VPN on every device and remembering to activate it is a hassle that no one really wants. Besides, some VPN providers don&#39;t support multiple connections at once,&amp;nbsp;but they do support connection to their service by a customized router. Setting up a router to do the VPN connection for you gets around multi-user limitations. The router makes a single connection and shares it with you over WiFi and Ethernet, just like you&#39;re used to with your ISP modem/router. To help you, I&#39;ve written an easy to follow,&amp;nbsp;&lt;a href=&quot;http://www.amazon.com/dp/B00M9O0CZS&quot; target=&quot;_blank&quot;&gt;step-by-step guide&lt;/a&gt;&amp;nbsp;so you can convert an inexpensive router into a round-the-clock VPN connection in your home. Want it done for you?&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/p/blog-page.html#.U_51f2RdX5Y&quot; target=&quot;_blank&quot;&gt;Get in touch with me&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.amazon.com/dp/B00M9O0CZS&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNiBE-3rD0-AxZVpVDbtZD8Cf0-6RLvxZsZIPmg9HpnDFzeGnrGEx5yWM3W_g3tcGhKwnvGsSOjL4ndsmGyxQZb-XaIbPZl7bJ2ffoow_DZaCop10nF_s2HmlnOfRbcfY0laEgGyGWR5mw/s1600/Border+Free+Router+v2.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Aside from encryption and getting around peering problems, VPN has an additional feature and the reason that many outside of the United States use them. Your connection to the VPN provider can be in multiple countries and cities. So if you&#39;re in Toronto and you connect to a VPN server in New York, you will appear to be accessing the internet from New York. Same goes for other locations like the UK, Netherlands and Canada if your accessing from outside Canada. Geo-fences drop and in-market games become available.&lt;br /&gt;
&lt;br /&gt;
Have questions about peering problems, setting up a VPN router or having it done for you?&lt;br /&gt;
&lt;a href=&quot;http://www.ihelpinnovate.com/p/blog-page.html#.U_5gk2RdX5Y&quot; target=&quot;_blank&quot;&gt;Get in touch with me&lt;/a&gt;, leave me a comment or send me a&amp;nbsp;&lt;a href=&quot;https://twitter.com/dougkrug&quot; target=&quot;_blank&quot;&gt;tweet&amp;nbsp;@dougkrug&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;Image courtesy of pat138241/FreeDigitalPhotos.net&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/4129638262675706193/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2014/08/avoiding-netflix-peering-problem.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/4129638262675706193'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/4129638262675706193'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2014/08/avoiding-netflix-peering-problem.html' title='Avoiding the Netflix Peering Problem'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPT6rc_NN2AQUpTrxrFt6NQZTImdzqC7kjeUaQ0o3EP7NhQ6euZ_x0-kL7sjREzT8SCBgNpafTAVZ7Edei6PA2bs2PFQpjvkOmHQiSJBEvGrXvz9vxfrLREZhW3cx30GKQpT5GEDot2siJ/s72-c/Internet+Handshake.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-7744237377863046167</id><published>2014-04-03T14:55:00.000-04:00</published><updated>2017-03-11T14:21:29.301-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="1Password"/><category scheme="http://www.blogger.com/atom/ns#" term="cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="cryptography"/><category scheme="http://www.blogger.com/atom/ns#" term="encrypt"/><category scheme="http://www.blogger.com/atom/ns#" term="LastPass"/><category scheme="http://www.blogger.com/atom/ns#" term="OASW"/><category scheme="http://www.blogger.com/atom/ns#" term="passwords"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="social engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="WiFi"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows XP"/><title type='text'>Computer Security at Home and Online</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Had a great time presenting &quot;&lt;a href=&quot;https://db.tt/jYM3M0vT&quot;&gt;&lt;span class=&quot;s2&quot;&gt;Computer Security at Home and Online&lt;/span&gt;&lt;/a&gt;&quot; seminar to a sold-out crowd for &lt;a href=&quot;http://www.oasw.org/&quot;&gt;&lt;span class=&quot;s2&quot;&gt;Ontario Association of Social Workers!&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s3&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;If you missed the event, we discussed -&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;• How to mitigate the risk if you can&#39;t switch from Windows XP before the &lt;a href=&quot;http://windows.microsoft.com/en-us/windows/end-support-help&quot;&gt;&lt;span class=&quot;s2&quot;&gt;April 8, 2014 deadline&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;• Myths and recommendations surrounding secure passwords&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSrGMPmr5XqbqFk3zHP6-epCbWWeK8Iqvq-gvWejFsJ0FNsKb3zEBGiEeSXT9rpsA4Uc5BE8-oyKAW9EIghAFeNd6TV6uqUjaX8sSGW1DxPUeAo6PXxSInCeydytQrAn0LpVFncfBMx2I/s1600/Secure+Cloud+Image.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;132&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSrGMPmr5XqbqFk3zHP6-epCbWWeK8Iqvq-gvWejFsJ0FNsKb3zEBGiEeSXT9rpsA4Uc5BE8-oyKAW9EIghAFeNd6TV6uqUjaX8sSGW1DxPUeAo6PXxSInCeydytQrAn0LpVFncfBMx2I/s200/Secure+Cloud+Image.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;s4&quot;&gt;• Secure password management - i.e. &lt;a href=&quot;https://lastpass.com/&quot;&gt;&lt;span class=&quot;s2&quot;&gt;LastPass&lt;/span&gt;&lt;/a&gt; and &lt;a href=&quot;https://agilebits.com/onepassword&quot;&gt;&lt;span class=&quot;s2&quot;&gt;1Password&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;• Tips on WiFi security&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;• Cryptography basics and what you really need to know &lt;/span&gt;&lt;span class=&quot;s3&quot;&gt;now&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;• How to easily encrypt your files before upload to cloud providers&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;• Guarding against Social Engineering attacks&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;• Smartphone and tablet security recommendations&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;A PDF of the presentation is available from this secure&amp;nbsp;&lt;a href=&quot;https://db.tt/jYM3M0vT&quot;&gt;&lt;span class=&quot;s2&quot;&gt;link&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p4&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;Please leave me a comment or send me a &lt;a href=&quot;https://twitter.com/dougkrug&quot;&gt;&lt;span class=&quot;s2&quot;&gt;tweet&lt;/span&gt;&lt;/a&gt; - I&#39;d love to hear from you and help you with your security questions and concerns.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p4&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;style type=&quot;text/css&quot;&gt;
p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; line-height: 15.0px; font: 12.0px Verdana; color: #000000; -webkit-text-stroke: #0000ee}
p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; line-height: 15.0px; font: 12.0px Verdana; color: #000000; -webkit-text-stroke: #0000ee; min-height: 15.0px}
p.p3 {margin: 0.0px 0.0px 0.0px 0.0px; line-height: 15.0px; font: 12.0px Verdana; color: #000000; -webkit-text-stroke: #000000}
p.p4 {margin: 0.0px 0.0px 0.0px 0.0px; line-height: 15.0px; font: 12.0px Verdana; color: #000000; -webkit-text-stroke: #000000; min-height: 15.0px}
p.p5 {margin: 0.0px 0.0px 0.0px 0.0px; line-height: 11.0px; font: 9.0px Verdana; color: #000000; -webkit-text-stroke: #000000}
span.s1 {font-kerning: none; -webkit-text-stroke: 0px #000000}
span.s2 {text-decoration: underline ; font-kerning: none; -webkit-text-stroke: 0px #0000ee}
span.s3 {text-decoration: underline ; font-kerning: none}
span.s4 {font-kerning: none}
&lt;/style&gt;

















&lt;br /&gt;
&lt;div class=&quot;p5&quot;&gt;
&lt;span class=&quot;s4&quot;&gt;Image courtesy of ddpavumba/FreeDigitalPhotos.net&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/7744237377863046167/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2014/04/computer-security-at-home-and-online.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/7744237377863046167'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/7744237377863046167'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2014/04/computer-security-at-home-and-online.html' title='Computer Security at Home and Online'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSrGMPmr5XqbqFk3zHP6-epCbWWeK8Iqvq-gvWejFsJ0FNsKb3zEBGiEeSXT9rpsA4Uc5BE8-oyKAW9EIghAFeNd6TV6uqUjaX8sSGW1DxPUeAo6PXxSInCeydytQrAn0LpVFncfBMx2I/s72-c/Secure+Cloud+Image.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-3794265253082815305</id><published>2014-02-24T11:10:00.000-05:00</published><updated>2017-03-11T14:11:50.656-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cryptography"/><category scheme="http://www.blogger.com/atom/ns#" term="identity theft"/><category scheme="http://www.blogger.com/atom/ns#" term="loss of assets"/><category scheme="http://www.blogger.com/atom/ns#" term="online"/><category scheme="http://www.blogger.com/atom/ns#" term="passwords"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="protect"/><category scheme="http://www.blogger.com/atom/ns#" term="safeguard"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="Solo Traveler"/><title type='text'>Easily Protect Identity and Safeguard Your Privacy</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Strong passwords are critical to preventing identity theft, loss of assets and damage to personal privacy. Almost a year ago, I wrote about&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2013/04/your-security-under-siege.html&quot;&gt;&lt;span class=&quot;s2&quot;&gt;how our online security is under attack&lt;/span&gt;&lt;/a&gt;. Things have gotten worse since then and we&#39;re currently losing the battle, in part due to weak passwords or duplication on multiple websites. One site gets hacked and the gates are open everywhere.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2NfvDVIDmsmiJg428L9AqsQxuA9MfDs0zTMRByqj1uYvJbrHWjyA3SnmQa86GabIqh58AI7RgBmzeN8jkBuXRYBy_oZQe_qmcna_-ZwFDEWLDPQ1JBstqxbvNN-A-e6Pp6iStkrvr85k/s1600/Cloud+with+lock.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2NfvDVIDmsmiJg428L9AqsQxuA9MfDs0zTMRByqj1uYvJbrHWjyA3SnmQa86GabIqh58AI7RgBmzeN8jkBuXRYBy_oZQe_qmcna_-ZwFDEWLDPQ1JBstqxbvNN-A-e6Pp6iStkrvr85k/s1600/Cloud+with+lock.png&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;s1&quot;&gt;Don&#39;t think for even a second that because you used your kid&#39;s name and a few numbers, you&#39;ve somehow fooled the bad guys or made it difficult, because you haven&#39;t. Just as dangerous is the use of the same passwords everywhere, making them all rememberable or writing all of them down on paper;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;s3&quot;&gt;Big mistakes&lt;/span&gt;&lt;span class=&quot;s1&quot;&gt;&amp;nbsp;in our complex online world.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
&lt;span class=&quot;s3&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Read my&amp;nbsp;&lt;a href=&quot;http://solotravelerblog.com/password-security-and-easy-access-as-you-travel/&quot;&gt;&lt;span class=&quot;s2&quot;&gt;latest post on Solo Traveler&lt;/span&gt;&lt;/a&gt;&amp;nbsp;and learn a simple, free and very secure method for endless strong passwords, automatically generated and stored for you.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;a href=&quot;http://blog.lastpass.com/2010/07/lastpass-gets-green-light-from-security.html&quot;&gt;Trusted by security experts&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;s1&quot;&gt;&amp;nbsp;who really understand cryptography and how to safeguard your privacy, these solutions are a must-have. Don&#39;t make identity theft easy for the ever increasing number of attackers out there. Take this simple step and protect yourself!&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/3794265253082815305/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2014/02/easily-protect-identity-and-safeguard.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3794265253082815305'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3794265253082815305'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2014/02/easily-protect-identity-and-safeguard.html' title='Easily Protect Identity and Safeguard Your Privacy'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2NfvDVIDmsmiJg428L9AqsQxuA9MfDs0zTMRByqj1uYvJbrHWjyA3SnmQa86GabIqh58AI7RgBmzeN8jkBuXRYBy_oZQe_qmcna_-ZwFDEWLDPQ1JBstqxbvNN-A-e6Pp6iStkrvr85k/s72-c/Cloud+with+lock.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-3074998777721945662</id><published>2013-11-11T21:34:00.000-05:00</published><updated>2017-03-11T14:25:48.339-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bell Canada"/><category scheme="http://www.blogger.com/atom/ns#" term="Bitcoin"/><category scheme="http://www.blogger.com/atom/ns#" term="Chrome"/><category scheme="http://www.blogger.com/atom/ns#" term="cryptolocker"/><category scheme="http://www.blogger.com/atom/ns#" term="cryptoprevent"/><category scheme="http://www.blogger.com/atom/ns#" term="Firefox"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Explorer"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="Norton"/><category scheme="http://www.blogger.com/atom/ns#" term="Opera"/><category scheme="http://www.blogger.com/atom/ns#" term="phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="ransomware"/><category scheme="http://www.blogger.com/atom/ns#" term="Safari"/><category scheme="http://www.blogger.com/atom/ns#" term="SSL"/><category scheme="http://www.blogger.com/atom/ns#" term="Symantec"/><category scheme="http://www.blogger.com/atom/ns#" term="WIndows"/><title type='text'>CryptoLocker ruins a perfectly good day</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
There&#39;s a new, very serious,&amp;nbsp; and worrisome threat that can affect any Windows user. Even if you&#39;re a Mac or Linux user, keep reading because you inevitably know someone with a Windows PC. Even if you don&#39;t know any Windows users, it&#39;s only a matter of time before a special version of this threat is made just for you.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigkdJ4vbkfqWg-5EeB0BO2CojJac-i-MMm3azlxV0uGySuWbk8havUEsP3XYgEKovPMv1FZMuLS5RI5K9MIS5YTkEp5h4QPuCDInbG1Wa3bbFmSn_WBhauanSAtLKUdO2CcnKNmq_gsG5w/s1600/money+lock.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigkdJ4vbkfqWg-5EeB0BO2CojJac-i-MMm3azlxV0uGySuWbk8havUEsP3XYgEKovPMv1FZMuLS5RI5K9MIS5YTkEp5h4QPuCDInbG1Wa3bbFmSn_WBhauanSAtLKUdO2CcnKNmq_gsG5w/s200/money+lock.jpg&quot; width=&quot;132&quot; /&gt;&lt;/a&gt;Before I describe the ransomware and its very serious threat, let me stress that prevention is the best defense. Do not assume that you are safe just because you have anti-virus or anti-malware software installed.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;Follow these recommendations&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
1. Avoid being tricked by phishing email.&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;u&gt;Do&amp;nbsp;&lt;b&gt;NOT&lt;/b&gt;&lt;/u&gt;&amp;nbsp;click links in email or open attached applications. If you get an email that looks reasonable and has a link, do not click it unless you are certain about where that link is going to take you. Typically you can mouse over a link (&lt;b&gt;without clicking it&lt;/b&gt;) and you will be able to see where it&#39;s going to take you. Most browsers show this at the bottom left of the browser window.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
2. Avoid the use of Internet Explorer. I have lost faith in Microsoft to adequately secure this browser. They have been endlessly trying and do not seem to be able to do it for any significant length of time. Exploits are frequent. For secure browsing I suggest any of the following browsers for Mac, Windows or Linux users&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;Firefox, Chrome, Safari (for Mac users) or Opera&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
3. Avoid web pages that you are unfamiliar with or that look official, but something is not quite right. If you are unsure, do a Google search and look for search results that show the name of the service or company in the first part of their web address. This is not always the case, but very often it is what the company or service will use.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;Example:&lt;/b&gt;&amp;nbsp; Although Microsoft has many other websites, you are safest to navigate to a Microsoft satellite website by first starting from&amp;nbsp;&lt;i&gt;&lt;a href=&quot;http://www.microsoft.com/&quot;&gt;www.microsoft.com&lt;/a&gt;&lt;/i&gt;&amp;nbsp;and searching for what you are looking for from there.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
4. Look for secure sites where they should be secure. This is not to say that every site must be secure, but where appropriate, you want to verify that the site is using what is known as an SSL certificate (Secure Socket Layer) and that it is valid.&amp;nbsp; If your are navigating to your bank for example, it should always start with&amp;nbsp;&lt;b&gt;https:&lt;/b&gt;&amp;nbsp; when you are at the login page,&amp;nbsp;&lt;span class=&quot;s1&quot;&gt;not&lt;/span&gt;&amp;nbsp;&lt;b&gt;http:&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Your browser should automatically notify you when an SSL certificate is not valid or has been revoked.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;b&gt;&lt;/b&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Note: Although ihelpinnovate.com does not use an SSL certificate, it is hosted by Google and you can check that it does not contain any threats by using Symantec&#39;s Norton Safe Web, where it is registered and has been verified.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
View my Norton Safe Web report at&amp;nbsp;&lt;a href=&quot;https://safeweb.norton.com/&quot;&gt;https://safeweb.norton.com/&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;b&gt;&lt;/b&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
While we&#39;re on the topic of site security certificates, any site that asks for you to enter a username and password for an account you hold, should always start with&amp;nbsp;&lt;b&gt;https:&lt;/b&gt;&amp;nbsp;when you are at the login stage. Some exceptions are certain sites that have a separate drop-down window for login. This annoying trend practiced by companies like Bell Canada is in-fact connecting you by a secure link. Unfortunately, non-technical users do not have the simple method of verification by looking at the browser address bar before entering confidential username and password information when logging on via their home page. If you&#39;re a Bell Canada user and you want to be sure you&#39;re logging onto your account via a verifiably secure webpage, use the link&amp;nbsp;&lt;a href=&quot;https://mybell.bell.ca/&quot;&gt;https://mybell.bell.ca/&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
OK, so now that we&#39;ve reviewed basic prevention, let me tell you about the ransomware and its very serious and costly threat.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
There&#39;s been a lot written about this and it&#39;s been in the mainstream media lately as well. This latest malware threat called CryptoLocker holds victims hostage to pay a $300 ransom within 72 hours. They do this by using a very strong, unbreakable encryption algorithm and systematically applying it to all files on your local disk and attached drives.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
In order to decrypt the files, you must obtain what is known as a private key. This is required to &quot;unlock&quot; the encryption. Since this malware attacks &quot;hot&quot; volumes with mapped drive letters, like Drive C, D, E, etc., your files on services like DropBox are also at risk of being encrypted. Even if you&#39;ve already encrypted your files before storing them, the encrypted files can still be encrypted by the malware, making access by your own decryption software impossible without the private key from the attackers.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
If you don&#39;t have the files backed up via a &quot;cold&quot; backup solution that is either offline at the time of the infection or that is not backed up via a shared drive letter (i.e. Drive C, D, E, etc.) then you will not be able to regain access to your files unless you pay the ransom, get the decryption key and hopefully, it works. There have been reports of all types. Ranging from the ransom being paid without a decryption key being delivered or the ransom was paid and the key did not decrypt the files, to the ransom was paid and the files were successfully decrypted, making them once again accessible.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
It&#39;s easy to recommend not paying the ransom because it encourages this kind of criminal activity in the future or you might not regain access to your files anyway. But if you don&#39;t have the files safely backed up and you really need them, then there is no other way to decrypt your files. It is not possible to break this encryption level.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Worse still, the ransomware is reported in recent incarnations, to also be deleting windows shadow copies. A shadow copy is the technical term for Microsoft&#39;s roll back technology that normally allows you to restore the system to an earlier state, before a problem existed.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
In the latest security news covering this, there is apparently a service being offered by the offenders that will get your files back even after the 72 hour period has past, but it will cost you 10 Bitcoin, which is about $3200 at the moment.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
One particularly bad result of this is, people who have not backed up might misunderstand the exact severity of this whole thing. Part of the reason I felt compelled to write about this in the first place. If you simply remove the malware, well that may not be what you wanted if you were willing to pay the ransom. It&#39;s not so easy to just say goodbye to data that is critically important, when you had no backup and there&#39;s a chance for recovery.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;&lt;u&gt;It&#39;s not all grim.&lt;/u&gt;&amp;nbsp;There are some effective means of protection.&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
1. Use Sandboxie.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;http://www.sandboxie.com/&quot;&gt;http://www.sandboxie.com/&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
By using this software to &quot;Sandbox&quot; (isolate) your web browser and email client, you are able to stop the malware from encrypting files on your local hard drive or shared drive.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
2. Backup your files using products that run backup applications to backup to cloud backup, without mapping the drive. An example is a product like Cryptonite Cloud Backup.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
3. If you&#39;re a slightly technical user, you can always run your web browser and email inside a virtual machine, like Virtualbox&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://www.virtualbox.org/&quot;&gt;https://www.virtualbox.org/&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
4. For now, users of the paid OpenDNS Umbrella service are reportedly safe, because the malware cannot reach the randomly generated domains it needs to, in order to begin encrypting the victims files. However, a solution like this may not last if the attackers modify the malware to generate an encryption key locally that could still be effective at ruining your day.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
5. Lastly, there is CryptoPrevent, but this is one of the less favorable forms of protection and it can cause a lot of false positives.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
I hope this information helps to prevent you from getting the malware. I&#39;m following this in the security arenas and I&#39;ll update this blog if I find some good updates.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Please share this blog. I know it&#39;s long, but if not in its entirety, please at least share the information regarding best practices and prevention.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;p1&quot;&gt;
For more information about this, please visit the following safe links, leave me a comment or send me a tweet&amp;nbsp;&lt;a href=&quot;https://twitter.com/dougkrug&quot; target=&quot;_blank&quot;&gt;@dougkrug&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;http://www.us-cert.gov/ncas/alerts/TA13-309A&quot;&gt;http://www.us-cert.gov/ncas/alerts/TA13-309A&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://www.grc.com/sn/sn-427.txt&quot;&gt;https://www.grc.com/sn/sn-427.txt&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;p1&quot; style=&quot;-webkit-text-stroke-width: 0px; color: black; font-family: Verdana; font-size: medium; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; orphans: 2; text-align: start; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
&lt;div style=&quot;margin: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;Image courtesy of Pixomar/FreeDigitalPhotos.net&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/3074998777721945662/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2013/11/theres-new-very-serious-and-worrisome.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3074998777721945662'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3074998777721945662'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2013/11/theres-new-very-serious-and-worrisome.html' title='CryptoLocker ruins a perfectly good day'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigkdJ4vbkfqWg-5EeB0BO2CojJac-i-MMm3azlxV0uGySuWbk8havUEsP3XYgEKovPMv1FZMuLS5RI5K9MIS5YTkEp5h4QPuCDInbG1Wa3bbFmSn_WBhauanSAtLKUdO2CcnKNmq_gsG5w/s72-c/money+lock.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-8171372337482100357</id><published>2013-09-24T18:43:00.000-04:00</published><updated>2017-03-11T13:39:48.769-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="Solo Traveler"/><category scheme="http://www.blogger.com/atom/ns#" term="travel"/><category scheme="http://www.blogger.com/atom/ns#" term="traveling"/><category scheme="http://www.blogger.com/atom/ns#" term="VOIP"/><title type='text'>VoIP: The Voice of the Internet</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ-vQmpfaim7aQHOyJ5jQKMKvn1TauIcSP-4dQTyyKSUnIYP3_wjvlvJZn0ogO0inBIq4Z6LulgNaxdjr6sVJUeU3SrI2w43L_xZBh2ik227mYfyaoSFxl_Nx4ncmLqZrFEMtyGVc05nZt/s1600/Tin+can+phone.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;145&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ-vQmpfaim7aQHOyJ5jQKMKvn1TauIcSP-4dQTyyKSUnIYP3_wjvlvJZn0ogO0inBIq4Z6LulgNaxdjr6sVJUeU3SrI2w43L_xZBh2ik227mYfyaoSFxl_Nx4ncmLqZrFEMtyGVc05nZt/s200/Tin+can+phone.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;s1&quot;&gt;Whether traveling the world or just crossing town, Voice over Internet Protocol or VoIP for short, can dramatically reduce the cost of reaching out to anyone, anywhere in the world.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;-webkit-text-stroke-width: initial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;-webkit-text-stroke-width: initial;&quot;&gt;Find out more about the gift of freedom this Cloud-based technology can provide you, in my latest Travel Technology post on&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://solotravelerblog.com/travel-technology-low-cost-voice-calls-around-the-world/&quot; style=&quot;-webkit-text-stroke-width: initial;&quot;&gt;&lt;span class=&quot;s3&quot;&gt;Solo Traveler Blog&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;-webkit-text-stroke-width: initial;&quot;&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;Image courtesy of Chanpipat/FreeDigitalPhotos.net&lt;/span&gt;&lt;br /&gt;
&lt;style type=&quot;text/css&quot;&gt;
p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; line-height: 15.0px; font: 12.0px Verdana; color: #000000; -webkit-text-stroke: #000000}
p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; line-height: 15.0px; font: 12.0px Verdana; color: #000000; -webkit-text-stroke: #0000ee; min-height: 15.0px}
span.s1 {font-kerning: none}
span.s2 {text-decoration: underline ; font-kerning: none}
span.s3 {text-decoration: underline ; font-kerning: none; -webkit-text-stroke: 0px #0000ee}
&lt;/style&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/8171372337482100357/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2013/09/voip-voice-of-internet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/8171372337482100357'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/8171372337482100357'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2013/09/voip-voice-of-internet.html' title='VoIP: The Voice of the Internet'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ-vQmpfaim7aQHOyJ5jQKMKvn1TauIcSP-4dQTyyKSUnIYP3_wjvlvJZn0ogO0inBIq4Z6LulgNaxdjr6sVJUeU3SrI2w43L_xZBh2ik227mYfyaoSFxl_Nx4ncmLqZrFEMtyGVc05nZt/s72-c/Tin+can+phone.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-3494442634488770340</id><published>2013-09-11T23:56:00.000-04:00</published><updated>2017-03-11T13:26:50.601-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="32bit"/><category scheme="http://www.blogger.com/atom/ns#" term="64bit"/><category scheme="http://www.blogger.com/atom/ns#" term="802.11ac"/><category scheme="http://www.blogger.com/atom/ns#" term="A7"/><category scheme="http://www.blogger.com/atom/ns#" term="AirDrop"/><category scheme="http://www.blogger.com/atom/ns#" term="Andriod"/><category scheme="http://www.blogger.com/atom/ns#" term="Apple"/><category scheme="http://www.blogger.com/atom/ns#" term="cryptography"/><category scheme="http://www.blogger.com/atom/ns#" term="DSLR"/><category scheme="http://www.blogger.com/atom/ns#" term="fingerprint"/><category scheme="http://www.blogger.com/atom/ns#" term="iCloud"/><category scheme="http://www.blogger.com/atom/ns#" term="iOS 7"/><category scheme="http://www.blogger.com/atom/ns#" term="iPhone 5S"/><category scheme="http://www.blogger.com/atom/ns#" term="iTunes Radio"/><category scheme="http://www.blogger.com/atom/ns#" term="LastPass"/><category scheme="http://www.blogger.com/atom/ns#" term="M7"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac OS"/><category scheme="http://www.blogger.com/atom/ns#" term="NFC"/><category scheme="http://www.blogger.com/atom/ns#" term="Phil Schiller"/><category scheme="http://www.blogger.com/atom/ns#" term="Touch ID"/><title type='text'>Just another iPhone 5S review</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;The Announcements&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
If you were hoping for revolutionary, and were disappointed by the evolutionary announcements from Apple on September 10, take a break from hype and the haters to see it for what it is. I&#39;m not going to describe every feature and curve of the phone, Apple are masters of that, so start by having a look at their&amp;nbsp;&lt;a href=&quot;http://www.apple.com/iphone/&quot; target=&quot;_blank&quot;&gt;website&lt;/a&gt;&amp;nbsp;if you missed what&#39;s new.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaC8CJnqnKYmnR1bxfcNQuBgtWxAHzcBW9cYpBMAwl8FU2PvjRdW26S8NtynFbNulhJLcVS2cOkKpRiE1ky0DWl6qS72s8X5cDDz9LTOJuHDpO3wzyFvEz-hcXwCDwJXVARPHhMf7yo3Mg/s1600/ios_hero.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;168&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaC8CJnqnKYmnR1bxfcNQuBgtWxAHzcBW9cYpBMAwl8FU2PvjRdW26S8NtynFbNulhJLcVS2cOkKpRiE1ky0DWl6qS72s8X5cDDz9LTOJuHDpO3wzyFvEz-hcXwCDwJXVARPHhMf7yo3Mg/s200/ios_hero.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;&lt;i&gt;A7 64bit Processor&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
64bit processors matter where you&#39;re dealing with math that can&#39;t fit into 32bit. The obvious winner from this is the iPhone 5S and later owner. This would seem to indicate that Apple is serious about security since one of the key benefits is cryptography.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Another key benefactor of 64bit architecture is graphics. There will be a new iPad soon and having better gaming graphics was highlighted in the iPhone keynote. Harmonizing 64bit apps across the top sellers makes perfect sense.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;&lt;i&gt;Touch ID&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Apple&#39;s mysterious new fingerprint scanner to unlock your phone and purchase items from the App Store, some have commented is one of few innovations in this latest generation of iPhone. On the surface, it definitely sounds as though Apple has taken the time to do this properly out of the gate.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpYuSU8E7gRPGxnNkcCZrl81awlNsiO8DGXmqGAdyrN1sGKWUctmGxAKt9vmz0iGwSUD1O7hsrA2EXlVD-eo_dXFN2kAQNU17wKUc3wKmJc6O5tKEjmHwff0joGw-uuDTkoiNFbqCQVe2_/s1600/touchid_hero.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;90&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpYuSU8E7gRPGxnNkcCZrl81awlNsiO8DGXmqGAdyrN1sGKWUctmGxAKt9vmz0iGwSUD1O7hsrA2EXlVD-eo_dXFN2kAQNU17wKUc3wKmJc6O5tKEjmHwff0joGw-uuDTkoiNFbqCQVe2_/s200/touchid_hero.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
Security-wise, it stores your impression as an encrypted hash. This is good, as it means that even if someone were to somehow gain access to the stored information representative of your fingerprint, it would be useless to them.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Although it&#39;s early to make a call, many who understand biometrics are claiming that simply analyzing a print without measuring temperature leaves the iPhone 5S open to spoofing by lifting prints and copying them on a 3D printer. Once the phone is in the hands of the public, we&#39;ll have the answer, because you just know there&#39;s a line up of hack attempts waiting for it.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Still, the fact that Apple is putting their money where their mouth is by allowing purchases from their store, says a lot about their confidence in this new feature.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;&lt;i&gt;The M7 coprocessor&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;b&gt;&lt;/b&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
This power saving addition has had very little mention versus the 64bit architecture, Touch ID and what the phone doesn&#39;t have. But even though Phil Schiller only mentioned fitness uses for the M7, this isn&#39;t to say that it won&#39;t have strong benefits to mapping and navigation. Trying to navigate in areas with spotty GPS coverage can be helped tremendously by a low powered coprocessor that can continue to report direction, movement and orientation even durning a loss of coverage.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi97jZeNEnRhT58aOZsK3QgC3W8zF1_d4a8Yq0coTknXofQpdc59XhY3bDvKv9wAWDmSM1bB5DmAwR_K867Bkh2Q5cwgfXHMGIegwjY5DQANnnRHN2Qlnlnir1qyM8F4rcNw7jG6-LK7-rA/s1600/specs_processor_m7.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi97jZeNEnRhT58aOZsK3QgC3W8zF1_d4a8Yq0coTknXofQpdc59XhY3bDvKv9wAWDmSM1bB5DmAwR_K867Bkh2Q5cwgfXHMGIegwjY5DQANnnRHN2Qlnlnir1qyM8F4rcNw7jG6-LK7-rA/s1600/specs_processor_m7.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
What&#39;s most interesting about the M7 chip is not the stated use, but the potential uses from constantly tracking how an iPhone is oriented and what direction its facing. Is the phone moving and if so, how fast? This is significantly important realtime data.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;&lt;i&gt;True Tone Flash&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;b&gt;&lt;i&gt;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
I&#39;m personally an iPhone user and strong admirer of the great innovations in Android and the phones that are challenging Apple to keep their composure. One thing that has kept me content with iPhone is the exceptionally good photos (for a phone anyway).&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7vjr_MW_IAnHaJ8Re2-wyKs5voJrcBRQ32UKknIPOOyiT_vMhIKnJl1Ysz-I_hkk5sfKO036YYpJK_VGW3w4cAYyrvY3Nte4hyphenhyphenY8sYtgIR8j7kN569vG9ZyBmEbI06lpNEUqVRCzEFCfH/s1600/hero.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;90&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7vjr_MW_IAnHaJ8Re2-wyKs5voJrcBRQ32UKknIPOOyiT_vMhIKnJl1Ysz-I_hkk5sfKO036YYpJK_VGW3w4cAYyrvY3Nte4hyphenhyphenY8sYtgIR8j7kN569vG9ZyBmEbI06lpNEUqVRCzEFCfH/s200/hero.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
There&#39;s no question that Phil Schiller caused an outburst from many photographers by stating the iPhone 5S camera was in anyway DSLR level. Every iPhone is said to have a better camera than before, higher this and bigger that.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
But what is exceptionally important is the idea that we can now have smartphone cameras that will balance flash photography&amp;nbsp;&lt;u&gt;before&lt;/u&gt;&amp;nbsp;taking the picture. This is a big deal, since up to this point, smartphone flash photography has been a dismal effort.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;&lt;i&gt;iOS 7&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Let face facts, the real changes are coming with iOS 7. Borrowing from Android, features like control center to put common settings in one panel will make the iPhone easier to use.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinBBy3RZNi-RZzNEGlYcsjVG23WKTTDAwqUEQLESn9fg3w0weT9aRhxrvznG2yKTihD-rG9lRiGLl22QiXPwFMbBKw7Q5U6Ftzb13mhrwnNJNKdpwRepB1yb_Rlx5mMEyAiym9tGgrUBrO/s1600/iOS+7.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinBBy3RZNi-RZzNEGlYcsjVG23WKTTDAwqUEQLESn9fg3w0weT9aRhxrvznG2yKTihD-rG9lRiGLl22QiXPwFMbBKw7Q5U6Ftzb13mhrwnNJNKdpwRepB1yb_Rlx5mMEyAiym9tGgrUBrO/s1600/iOS+7.png&quot; /&gt;&lt;/a&gt;Another long awaited improvement is the ability to store passwords on the iPhone. Perhaps Apple just wasn&#39;t satisfied with their previous security capabilities, but it&#39;s been odd to have this feature only exist in MacOS until now. Regardless, you won&#39;t find me personally giving up the security and convenience of&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2013/02/ease-password-burden.html#.UjE5bWQ_9Gw&quot; target=&quot;_blank&quot;&gt;LastPass&lt;/a&gt;&amp;nbsp;unless the&amp;nbsp;&lt;a href=&quot;http://blog.lastpass.com/2013/09/lastpass-and-nsa-controversy.html&quot; target=&quot;_blank&quot;&gt;NSA forces them to shut down&lt;/a&gt;.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
AirDrop for iPhone makes perfect sense as a simple way to share photos between iPhones. This has been a wonderful feature to use since it was introduce to MacOS. Emailing or sharing via the cloud is not at all difficult, but AirDrop trumps it in terms of easy to use sharing with other iPhone users in close range. Unfortunately, you will need to have at least an iPhone 5, 4th gen iPad, iPad mini, 5th gen iPod Touch and iCloud to take advantage of AirDrop in iOS 7.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
iTunes Radio, while seemingly a me too product to competing services like Pandora, Spotify, Rdio, etc., some have pointed out that they are only being served music related ads, which helps with discovery of even more music.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;What&#39;s missing?&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;b&gt;&lt;/b&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Let&#39;s face it, haters are going to hate, so let&#39;s put it all out on the table.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;b&gt;&lt;/b&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;&lt;i&gt;NFC&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
There&#39;s no NFC (Near Field Communication) for paying at designated stores and coffee shops. I really wanted this feature when it first stated to appear in the Google Nexus phones, but the adoption in North America has been so slow that technologies like Geo-fencing, used by Square and others have made it almost obsolete before it&#39;s really even taken root.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
It&#39;s rumored that Apple is testing low energy Bluetooth radio as an alternate mobile payment system and will bypass NFC altogether.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;&lt;i&gt;5G WiFi&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Apple skipped adding the new, faster WiFi known as 802.11ac or 5G. Possibly because of its effect on battery life. I tested a Samsung S4 for 802.11ac performance with the latest Archer C7 router from TP-Link. While the speed was nice, I didn&#39;t find that it was a significantly better experience than similar phones with only 802.11n. While my testing did not involve battery capacity, users of the first two phones with 802.11ac, the HTC One and Samsung S4, have complained that their phones need charging more frequently than the previous HTC One and Samsung S3.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;&lt;i&gt;Bigger Screen Size&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Although many were still hoping to see screen sizes like the Android phones are getting, it was pretty obvious that if the leaked images were true, as they turned out to be, then the next iPhone screen would not grow in size, and that turned out to be accurate.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Apple has no need to follow the other phone manufactures in widening their screen size. While it seems an attractive feature, many don&#39;t want a phone that fills their pocket more or feels larger in their hand. I&#39;ve heard as many complaints as praises for the size of these larger phones. Many think it&#39;s what they want until they start using the phone regularly and discover it&#39;s larger than what is comfortable for them.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
While I&#39;m not betting against Apple eventually increasing the iPhone screen size, I wouldn&#39;t be surprised to find that they resist increasing it longer than expected.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;i&gt;What are your thoughts about the iPhone 5S? Has Apple missed the mark or are you planning to purchase when they&#39;re available beginning September 20?&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;i&gt;What features were you hoping for that you&#39;ll now have to wait and see if they appear in iPhone 6?&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Please leave me your comments or send me a Tweet&amp;nbsp;&lt;a href=&quot;https://twitter.com/dougkrug&quot; target=&quot;_blank&quot;&gt;@dougkrug&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/3494442634488770340/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2013/09/just-another-iphone-5s-review.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3494442634488770340'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3494442634488770340'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2013/09/just-another-iphone-5s-review.html' title='Just another iPhone 5S review'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaC8CJnqnKYmnR1bxfcNQuBgtWxAHzcBW9cYpBMAwl8FU2PvjRdW26S8NtynFbNulhJLcVS2cOkKpRiE1ky0DWl6qS72s8X5cDDz9LTOJuHDpO3wzyFvEz-hcXwCDwJXVARPHhMf7yo3Mg/s72-c/ios_hero.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-3872896068618236491</id><published>2013-09-05T15:46:00.000-04:00</published><updated>2017-03-11T13:20:45.940-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="1Password"/><category scheme="http://www.blogger.com/atom/ns#" term="Flash Drives"/><category scheme="http://www.blogger.com/atom/ns#" term="LastPass"/><category scheme="http://www.blogger.com/atom/ns#" term="NSA"/><category scheme="http://www.blogger.com/atom/ns#" term="PGPDisk"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="smartphones"/><category scheme="http://www.blogger.com/atom/ns#" term="Solid State Drives"/><category scheme="http://www.blogger.com/atom/ns#" term="SSD"/><category scheme="http://www.blogger.com/atom/ns#" term="Superman Memory Crystals"/><category scheme="http://www.blogger.com/atom/ns#" term="tablets"/><category scheme="http://www.blogger.com/atom/ns#" term="TruCrypt"/><category scheme="http://www.blogger.com/atom/ns#" term="UCSD"/><category scheme="http://www.blogger.com/atom/ns#" term="USB Flash"/><category scheme="http://www.blogger.com/atom/ns#" term="Wear Leveling"/><title type='text'>Securing your data on Flash Drives</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
Advances in solid state memory read/write speed and lower manufacturing costs are making Solid State Drives attractive options in new computers. Not to mention that your smartphone, tablet, and USB flash drives all use this technology.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;i&gt;One problem -&amp;nbsp;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;Flash memory cannot actually be erased&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
A&amp;nbsp;&lt;a href=&quot;http://nvsl.ucsd.edu/index.php?path=projects/sanitize&quot; target=&quot;_blank&quot;&gt;study by researchers at University of California San Diego&lt;/a&gt;&amp;nbsp;revealed that between 4% to 75% of a files contents remain completely intact when an attempt is made to erase flash memory. USB flash drives fared worse, were researchers could recover between 0.57% to 84.9% percent of file contents remaining on a USB flash drive after an overwrite attempt was made.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
Testing 12 Solid State Drives, UCSD researchers found that none of the available software techniques for erasing individual files proved effective. Erasing entire SSDs with native sanitize commands was most effective, but only when performed correctly. The software techniques were found to work most, but not all of the time. Of the twelve solid state drives they tested using the native &quot;Erase Unit&quot; command, only four were actually erased. One SSD had reported itself to be sanitized, yet the data was recoverable by the researchers.&lt;/div&gt;
&lt;div class=&quot;p4&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgprTJ6-eNrryKXvWWgIJsdmKs4cvY2H-6UyYmvkcMnznWImg6J_wMs8xbFlMPKo-G4nqPRhduFkjhfN5NTMRfsCzWZ8zCFEuoVtNiPaiwuwl16YgqF0-9WLOlXnBzFnqLgpQPXllDpkpWg/s1600/SSD+data+inspection+image.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgprTJ6-eNrryKXvWWgIJsdmKs4cvY2H-6UyYmvkcMnznWImg6J_wMs8xbFlMPKo-G4nqPRhduFkjhfN5NTMRfsCzWZ8zCFEuoVtNiPaiwuwl16YgqF0-9WLOlXnBzFnqLgpQPXllDpkpWg/s1600/SSD+data+inspection+image.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot;&gt;
Additionally, the methods used by the researchers to determine if the data has been truly wiped from flash memory is not available to the average consumer. Without a way for consumers to verify data has actually been completely removed from flash memory, there is no way to know if so called &quot;data sanitation&quot; is truly effective.&lt;/div&gt;
&lt;div class=&quot;p6&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
The key issues stem from the way that flash memory differs vs a conventional magnetic hard drive. Flash memory works by pushing electrons from one side to another of a barrier. This change of position is monitored and registered as either a 1 or 0, the binary code that is the basis of all modern computing.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Problem is, this pushing of electrons back and forth, causes the material to fatigue rapidly. To combat this, solid state memory manufactures use a method called &quot;Wear Leveling&quot;. This moves data around so read/write is not constantly occurring in the same physical spot on the memory.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;Wear Leveling creates a security issue&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Flash memory doesn&#39;t actually erase data at the time new data is written, it just marks it for deletion. Then comes Wear Leveling, duplicating chunks of data and moving it around between the time it&#39;s first written and then overwritten. Data marked for deletion is duplicated and moved by wear leveling and the so called &quot;garbage collection&quot; algorithm that was supposed to go back later and erase data marked for deletion, knows nothing about the data that was duplicated by wear leveling.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Since mobile smartphones, tablets and computers with solid state memory are purchased, sold and discarded at an ever increasing rate, it&#39;s important going forward that you are aware that your personal information and data cannot simply be permanently &quot;sanitized&quot; from these devices and could be recovered at a later time by someone who should not have it.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
One workaround that researchers suggest for manufacturers to employ is called &quot;Crypto-Erasure&quot;. But this method requires that the data is encrypted at the time it&#39;s first written. The idea is to encrypt all data on the device, so even if it can be recovered later, it will be useless to anyone who does not have the encryption key to access it. For the majority of devices, this is not the case and unsecured data has already been written to flash memory. This means any data already written to the device cannot necessarily ever be made secure.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;Why not just use degaussing to erase flash memory?&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Degaussing is a method used to render conventional magnetic media unreadable by exposing it to a very powerful magnetic field. For magnetic media, it is very effective, but flash memory is not affected by magnetic fields. In their&amp;nbsp;&lt;a href=&quot;http://cseweb.ucsd.edu/users/swanson/papers/Fast2011SecErase.pdf&quot; target=&quot;_blank&quot;&gt;research document&lt;/a&gt;, the method was evaluated and found to be completely ineffective on flash memory.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;So what&#39;s the answer? How do you protect yourself?&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Anyone with a Windows desktop or laptop can use&amp;nbsp;&lt;a href=&quot;http://www.truecrypt.org/&quot; target=&quot;_blank&quot;&gt;TruCrypt&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href=&quot;http://www.pgpi.org/products/pgp/versions/commercial/&quot; target=&quot;_blank&quot;&gt;PGPDisk&lt;/a&gt;&amp;nbsp;to protect their data on an SSD or USB flash drive. Mac users can take advantage of the built in&amp;nbsp;&lt;a href=&quot;http://www.apple.com/osx/what-is/security.html&quot; target=&quot;_blank&quot;&gt;FileVault&lt;/a&gt;&amp;nbsp;function found in the Security &amp;amp; Privacy settings. Using these methods, the data will be useless without the encryption key, leaving the device or storage media to be erased and securely re-written to again.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
For smartphones and tablets, end user privacy and security is largely in the hands of the manufacturer. While some data could be encrypted before storing on the device, native applications on the phone like note pad, address book, etc would not necessarily encrypt the data and protect your privacy when the device is end of life, and no longer in your possession.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Thankfully there are highly affordable, secure solutions such as&amp;nbsp;&lt;a href=&quot;https://lastpass.com/misc_download.php&quot; target=&quot;_blank&quot;&gt;LastPass&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;https://agilebits.com/onepassword&quot; target=&quot;_blank&quot;&gt;1Password&lt;/a&gt;&amp;nbsp;that can&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2013/04/your-security-under-siege.html#.Uijet2Q_9Gw&quot; target=&quot;_blank&quot;&gt;store your passwords&lt;/a&gt;, notes, credit card and other personal information securely so they cannot be accessed without a secure master password.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Hopefully these issues will come to the forefront of mainstream media, forcing all manufactures to provide verifiable encryption on all devices that use flash memory, which for now will increasingly be the storage media of choice until the day when data storage using nanostructures, in so called &quot;&lt;a href=&quot;http://www.southampton.ac.uk/mediacentre/news/2013/jul/13_131.shtml?1&quot; target=&quot;_blank&quot;&gt;Superman Memory Crystals&lt;/a&gt;&quot; makes the leap from laboratory to commercially viable and affordable.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
With all the news over the NSA&#39;s intrusion into privacy, the latest poll shows that 50% of users don&#39;t care. Where do you stand on the subject?&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Do you care if your personal data can be retrieved after you no longer own a device or storage disk?&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Please leave me a comment or send me a Tweet&amp;nbsp;&lt;a href=&quot;https://twitter.com/dougkrug&quot; target=&quot;_blank&quot;&gt;@dougkrug&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Image courtesy of thanunkorn/Freedigitalphotos.net&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;p7&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: black; font-family: Verdana; font-size: medium; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; margin: 0px; orphans: 2; text-align: start; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/3872896068618236491/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2013/09/securing-your-data-on-flash-drives.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3872896068618236491'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3872896068618236491'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2013/09/securing-your-data-on-flash-drives.html' title='Securing your data on Flash Drives'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgprTJ6-eNrryKXvWWgIJsdmKs4cvY2H-6UyYmvkcMnznWImg6J_wMs8xbFlMPKo-G4nqPRhduFkjhfN5NTMRfsCzWZ8zCFEuoVtNiPaiwuwl16YgqF0-9WLOlXnBzFnqLgpQPXllDpkpWg/s72-c/SSD+data+inspection+image.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-4055718903338456029</id><published>2013-07-31T21:03:00.002-04:00</published><updated>2017-03-11T18:13:41.497-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="cloud 101"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="The Cloud"/><title type='text'>Cloud 101</title><content type='html'>
&lt;br /&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Curious about what this so called &quot;Cloud&quot; this is and what it means to you in the future?&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgupyx4pU8gDI1q95H15BRMYH3nZgkZFKOc-MZ710dVF4JUyLiIFr7kGAOEBHOOl44fQRTfFEDhrtFs_bmUmREbPLtdlyHF7H5klZstCa7gwN6AWQb3oiEuY4Y-4fKmJRqp81RR4ySp0nc/s1600/Time+travel+blog.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;148&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgupyx4pU8gDI1q95H15BRMYH3nZgkZFKOc-MZ710dVF4JUyLiIFr7kGAOEBHOOl44fQRTfFEDhrtFs_bmUmREbPLtdlyHF7H5klZstCa7gwN6AWQb3oiEuY4Y-4fKmJRqp81RR4ySp0nc/s200/Time+travel+blog.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;s1&quot;&gt;Explore Cloud 101 - The ever changing cloud, your privacy and security on &lt;a href=&quot;http://archive.constantcontact.com/fs102/1011324025187/archive/1114346273746.html&quot;&gt;&lt;span class=&quot;s2&quot;&gt;boomerbizbuilder.com&lt;/span&gt;&lt;/a&gt; in Trudy&#39;s latest news letter written by your&#39;s truly.&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/4055718903338456029/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2013/07/cloud-101_31.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/4055718903338456029'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/4055718903338456029'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2013/07/cloud-101_31.html' title='Cloud 101'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgupyx4pU8gDI1q95H15BRMYH3nZgkZFKOc-MZ710dVF4JUyLiIFr7kGAOEBHOOl44fQRTfFEDhrtFs_bmUmREbPLtdlyHF7H5klZstCa7gwN6AWQb3oiEuY4Y-4fKmJRqp81RR4ySp0nc/s72-c/Time+travel+blog.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-3731970823518051667</id><published>2013-07-24T23:59:00.000-04:00</published><updated>2017-03-11T12:59:38.926-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Amazon"/><category scheme="http://www.blogger.com/atom/ns#" term="Apple TV"/><category scheme="http://www.blogger.com/atom/ns#" term="Chromcast"/><category scheme="http://www.blogger.com/atom/ns#" term="Chrome"/><category scheme="http://www.blogger.com/atom/ns#" term="Clicker"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="Google Play"/><category scheme="http://www.blogger.com/atom/ns#" term="HDTV"/><category scheme="http://www.blogger.com/atom/ns#" term="Hulu"/><category scheme="http://www.blogger.com/atom/ns#" term="Netflix"/><category scheme="http://www.blogger.com/atom/ns#" term="Pandora"/><category scheme="http://www.blogger.com/atom/ns#" term="VPN"/><title type='text'>Chromecast redefines HDTV streaming  </title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
I don&#39;t typically write about products on launch day, but I&#39;m very excited about Google&#39;s announcement today of&amp;nbsp;&lt;a href=&quot;http://googleblog.blogspot.ca/2013/07/from-tvs-to-tablets-everything-you-love.html&quot; target=&quot;_blank&quot;&gt;Chromecast&lt;/a&gt;. Streaming from the cloud directly to any HDTV just got incredibly simple and inexpensive.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Not only is the tiny device, a bargain at only $35, but it&#39;s also incredibly flexible. No need to learn a new interface or change your behavior, with Chromecast you can send the content you want to your TV with the&amp;nbsp;&lt;a href=&quot;http://www.youtube.com/watch?v=cKG5HDyTW8o&quot; target=&quot;_blank&quot;&gt;touch of a button&lt;/a&gt;.&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Since Chromecast streams content that is already in the cloud, it doesn&#39;t rely on the speed of your device or the speed of the WiFi network between your device and Chromecast, allowing for smooth streaming directly from content already on the internet.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Chromecast currently streams content from Google Play Movies &amp;amp; TV, Google Play Music, YouTube, Netflix, or it can mirror a tab in a Chrome browser on your smart phone, tablet or a computer you already have in your home, allowing you to show content on your TV from sites like Hulu, Amazon Instant Video, Clicker, etc. You can even multi-task on your device, without interrupting the video that&#39;s playing on your TV.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
How it works:&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirsesOhxQJJGeNf690ooLwWebTGAT7lydoQT8mfV13o_6AASAcUmz-HfOWXYQ2Iq4C6KRr6LAqSmRwzQKiyYgD6tqyOrMzgYqF1SrKxfi7MU6fq2mCj5PEgCLFv9JeDavCor4idh7Lp5js/s1600/Diagram.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirsesOhxQJJGeNf690ooLwWebTGAT7lydoQT8mfV13o_6AASAcUmz-HfOWXYQ2Iq4C6KRr6LAqSmRwzQKiyYgD6tqyOrMzgYqF1SrKxfi7MU6fq2mCj5PEgCLFv9JeDavCor4idh7Lp5js/s320/Diagram.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Chromecast runs a slim version of the Google Chrome browser and communicates with your Andriod, iOS, MacOS or Windows device to discover the content you are watching. With the touch of a button, Chromecast taps into the same content you are streaming on your device and streams it from the exact same point on your HDTV.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
No need to download a new application or learn a new interface, since Chromecast simply streams the exact same content you&#39;re already watching on your device by pulling it from the cloud at the same time.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Your device becomes the remote, allowing you to control playback and volume. Additionally, playback that started with one device, can be controlled seamlessly with another on the same WiFi network. For example, if someone in your home started streaming from their iPhone, you could easily take over later from your Android tablet.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Control from other apps like Pandora are coming and development is fully open&amp;nbsp;&lt;u&gt;without an approval requirement from Google&lt;/u&gt;.&amp;nbsp;&lt;b&gt;As if you weren&#39;t already sold on it&lt;/b&gt;, the product also comes with a&amp;nbsp;&lt;b&gt;complimentary three months of Netflix&lt;/b&gt;. There&#39;s little question that this pretty well replaces&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2013/04/three-months-with-google-tv.html&quot; target=&quot;_blank&quot;&gt;Google TV&lt;/a&gt;&amp;nbsp;as a streaming device for most people, for roughly 1/6 of the price.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Making perfect sense for anyone without an large investment of purchased iTunes content, this is serious competition to the much loved&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2012/10/apple-tv-unboxed.html&quot; target=&quot;_blank&quot;&gt;Apple TV&lt;/a&gt;. For just over the price of one Apple TV, you can tuck away three of these tiny devices behind the HDTVs in your home, and since you can stream content from Chrome, combine this with a&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2013/04/unblock-internet-no-streaming.html&quot; target=&quot;_blank&quot;&gt;VPN service&lt;/a&gt;&amp;nbsp;and you can potentially stream anything on the internet to your TV, except iTunes.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
What do you think about this new way of streaming content to your HDTV? Please leave me your comments or send me a Tweet&amp;nbsp;&lt;a href=&quot;https://twitter.com/dougkrug&quot; target=&quot;_blank&quot;&gt;@dougkrug&lt;/a&gt;.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Image source - Google - CC&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: black; font-family: Verdana; font-size: medium; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; margin: 0px; orphans: 2; text-align: start; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;-webkit-text-stroke-width: 0px; clear: both; color: black; font-family: Verdana; font-size: medium; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; margin: 0px; orphans: 2; text-align: center; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/3731970823518051667/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2013/07/chromecast-redefines-hdtv-streaming.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3731970823518051667'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/3731970823518051667'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2013/07/chromecast-redefines-hdtv-streaming.html' title='Chromecast redefines HDTV streaming  '/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirsesOhxQJJGeNf690ooLwWebTGAT7lydoQT8mfV13o_6AASAcUmz-HfOWXYQ2Iq4C6KRr6LAqSmRwzQKiyYgD6tqyOrMzgYqF1SrKxfi7MU6fq2mCj5PEgCLFv9JeDavCor4idh7Lp5js/s72-c/Diagram.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-4873970350864522470</id><published>2013-07-02T14:06:00.000-04:00</published><updated>2017-03-11T12:53:24.833-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="online security"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="restrictions"/><category scheme="http://www.blogger.com/atom/ns#" term="traveldudes"/><category scheme="http://www.blogger.com/atom/ns#" term="traveling"/><category scheme="http://www.blogger.com/atom/ns#" term="unblocked internet"/><title type='text'>Internet Privacy &amp; Security</title><content type='html'>&lt;div style=&quot;text-align: left;&quot;&gt;
There&#39;s no question that privacy online and security are top of mind these past few weeks. Whether you&#39;re traveling or not, I&#39;ve posted some great tips you&#39;ll want to checkout on &lt;a href=&quot;http://www.traveldudes.org/travel-tips/vpn-security-travelers/59246&quot;&gt;traveldudes.org&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.traveldudes.org/travel-tips/vpn-security-travelers/59246&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiO87ABTbYznZbefHEtSxplpl0usOJLya1vSbboTe6w4M44jS7Lo-Ms4euTn0D5LgbfpiV6_anvHK7beHwOW9KhDEA3zJL6nXluxki_Rw_5aq-gEw7XUCuNiHGcAKh8HCY94W6KGh4naoc/s1600/ID-100131455.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;133&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiO87ABTbYznZbefHEtSxplpl0usOJLya1vSbboTe6w4M44jS7Lo-Ms4euTn0D5LgbfpiV6_anvHK7beHwOW9KhDEA3zJL6nXluxki_Rw_5aq-gEw7XUCuNiHGcAKh8HCY94W6KGh4naoc/s200/ID-100131455.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;Keep things private online and guard your personal security, while at the same time opening restrictions from borders so you can enjoy the benefits of an unblocked internet.&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Have a question or comment, &lt;a href=&quot;http://www.ihelpinnovate.com/p/blog-page.html&quot;&gt;contact me&lt;/a&gt; or send me a tweet &lt;a href=&quot;https://twitter.com/dougkrug&quot;&gt;@dougkrug&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/4873970350864522470/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2013/07/internet-privacy-security.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/4873970350864522470'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/4873970350864522470'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2013/07/internet-privacy-security.html' title='Internet Privacy &amp; Security'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiO87ABTbYznZbefHEtSxplpl0usOJLya1vSbboTe6w4M44jS7Lo-Ms4euTn0D5LgbfpiV6_anvHK7beHwOW9KhDEA3zJL6nXluxki_Rw_5aq-gEw7XUCuNiHGcAKh8HCY94W6KGh4naoc/s72-c/ID-100131455.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-6904844924930454127</id><published>2013-06-26T15:25:00.000-04:00</published><updated>2017-03-11T12:33:30.752-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2.4 GHz"/><category scheme="http://www.blogger.com/atom/ns#" term="5 GHz"/><category scheme="http://www.blogger.com/atom/ns#" term="802.11ac"/><category scheme="http://www.blogger.com/atom/ns#" term="802.11n"/><category scheme="http://www.blogger.com/atom/ns#" term="Home Plug"/><category scheme="http://www.blogger.com/atom/ns#" term="inSSIDer"/><category scheme="http://www.blogger.com/atom/ns#" term="iStumbler"/><category scheme="http://www.blogger.com/atom/ns#" term="Mashable"/><category scheme="http://www.blogger.com/atom/ns#" term="Shields UP"/><category scheme="http://www.blogger.com/atom/ns#" term="Steve Gibson"/><category scheme="http://www.blogger.com/atom/ns#" term="UPnP"/><category scheme="http://www.blogger.com/atom/ns#" term="WiFi"/><category scheme="http://www.blogger.com/atom/ns#" term="WiFi Alliance"/><category scheme="http://www.blogger.com/atom/ns#" term="WiFi network"/><category scheme="http://www.blogger.com/atom/ns#" term="WiFi router"/><title type='text'>Improving WiFi signal and security</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
I have to thank&amp;nbsp;&lt;a href=&quot;http://mashable.com/2013/06/26/better-wifi-signal/&quot; target=&quot;_blank&quot;&gt;Mashable&lt;/a&gt;&amp;nbsp;for their well intentioned, but slightly flawed article on improving WiFi signals for inspiring this post.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
This&amp;nbsp;&lt;b&gt;is&lt;/b&gt;&amp;nbsp;the time of year when being outside is a real pleasure, but using your laptop, tablet, or smartphone while staying connected on your deck or front porch is a struggle for many.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
You might think that you need a new WiFi router, and it&#39;s possible that you do, but try my tips before you spring for a&amp;nbsp;shiny&amp;nbsp;new box you may not need.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkRqQMApQ5aiy-DdK9FWD-8cK-BFaMlcfKaXCrSgbVUxinbZhnDFxs9PeVXlbNBrE_kZtZCwMXos8X_0Mwi7Mmjug7gt7QG9yDz55kSoRgAoZT7dw2GhAqHvwrIMEmFL8RR8zUgsFIDpcB/s1600/WiFi+logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkRqQMApQ5aiy-DdK9FWD-8cK-BFaMlcfKaXCrSgbVUxinbZhnDFxs9PeVXlbNBrE_kZtZCwMXos8X_0Mwi7Mmjug7gt7QG9yDz55kSoRgAoZT7dw2GhAqHvwrIMEmFL8RR8zUgsFIDpcB/s200/WiFi+logo.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;1. Get the WiFi off the floor!&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
I&#39;ve seen many WiFi routers tucked underneath a desk and this is the worst place if you&#39;re trying to extend your signal range. Get it up high (minimum of 3 feet off the ground) and you&#39;ll see an instant improvement.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;2. Don&#39;t block the signal path&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
The antennas of WiFi routers may send the signal in multiple directions, but the path to your WiFi enable laptop, tablet or smart phone is a straight line, not around a corner. Some signal bounce occurs, but mostly its just absorb or blocked by building materials and objects in your home. Avoid putting your WiFi router behind a monitor, as the metal shielding they contain works all too well at blocking signals.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;3. Centralize the WiFi router in your home&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
If your goal is even coverage throughout your home, don&#39;t put the WiFi router in a corner of your basement and expect a strong signal (or any at all) on the second floor, at the opposite end of your home. Too often I&#39;ve found WiFi routers tucked in a corner of the basement under a tiled kitchen floor above. When ceramic tile is laid on a flexible surface like the wood subfloor of a house, they use a heavy steel mesh to keep it from flexing at the grout lines. This mesh is a good signal blocker, and obviously not what you want.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;4. Optimize the WiFi router settings&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
As explained in the&amp;nbsp;&lt;a href=&quot;http://mashable.com/2013/06/26/better-wifi-signal/&quot; target=&quot;_blank&quot;&gt;Masable article&lt;/a&gt;, its a good idea to turn off features you don&#39;t need like 802.11b for older devices, but while these improve speed, they won&#39;t boost signal strength. What you need for distance is a lower frequency setting (2.4 GHz WiFi), but this comes at a price. If your WiFi router is operating at 2.4 GHz (Gigahertz signal frequency) you are more susceptible to interference from your neighbor&#39;s WiFi, Microwave ovens and some cordless phones that don&#39;t use the newer DECT 6.0 technology. To combat interference from neighboring WiFi, search for WiFi channels that are not in use near the location of your WiFi router. You can use free software like&amp;nbsp;&lt;a href=&quot;http://www.istumbler.net/&quot; target=&quot;_blank&quot;&gt;iStumbler&lt;/a&gt;&amp;nbsp;for Mac or&amp;nbsp;&lt;a href=&quot;http://www.metageek.net/support/downloads/&quot; target=&quot;_blank&quot;&gt;inSSIDer&lt;/a&gt;&amp;nbsp;on a PC to discover what WiFi channels are in use around you and manually set your router to an unused channel or to one with a weak signal from your neighbors.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
There&#39;s a common misconception that 5 GHz WiFi will solve all your problems and that is false. While you&#39;ll gain some independence from the common sources of interference, this higher frequency (shorter radio waves) cannot penetrate walls and objects in your home as effectively as the 2.4 GHz frequency range can. Also, don&#39;t be mislead into thinking that the new 802.11ac standard is going to boost signal, because it won&#39;t. The new 802.11ac gives you faster throughput, but operates in the 5GHz frequency range, so the same issues occur whether your router is using 802.11n @ 5 GHz or 802.11ac @ 5 GHz.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;5. Spend money wisely&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
I&#39;ve tried repeaters or range extenders with unimpressive results. Keep in mind that depending on the type and settings, these can actually slow down the entire WiFi network in your home. If positioning the Internet Service Provider&#39;s combination modem/WiFi router is limited by where the cable or phone line enters your home, consider running a physical ethernet cable from the ISP modem/router to your own WiFi router in a better location for signals. This will allow you to either have two separately located&amp;nbsp;WiFi points of access in your home, or a single optimally located WiFi router for maximum coverage. If fishing an ethernet cable through your home is not your thing, consider using&amp;nbsp;&lt;a href=&quot;https://www.homeplug.org/home/&quot; target=&quot;_blank&quot;&gt;Home Plug&lt;/a&gt;&amp;nbsp;to extend your wired network to&amp;nbsp;a WiFi router placed in an optimal location for good signal reception.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;b&gt;Secure advice&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
The technician your Internet Service Provider sends out will not always have your personal security in mind. Take control and make sure no matter how you access WiFi that it is secured with&amp;nbsp;&lt;b&gt;WPA2&lt;/b&gt;&amp;nbsp;encryption.&amp;nbsp;&lt;b&gt;&lt;u&gt;NEVER USE&lt;/u&gt;&lt;/b&gt;&amp;nbsp;&lt;b&gt;WEP&lt;/b&gt;&amp;nbsp;encryption. WEP is old encryption that was permanently compromised not long after it became available. Anyone can download software that will quickly break into a wireless network encrypted with WEP. The&amp;nbsp;&lt;a href=&quot;http://www.wi-fi.org/knowledge-center/faq/i-have-wep-equipment-in-my-network-and-am-not-able-to-replace-it-what-should-i&quot; target=&quot;_blank&quot;&gt;WiFi Alliance&lt;/a&gt;&amp;nbsp;and all responsible router manufacturers do not recommend it and new routers often default to&amp;nbsp;&lt;b&gt;WPA2&lt;/b&gt;&amp;nbsp;encryption out of the box, but if you have an older WiFi router or a 2WIRE modem/router, these may be set to WEP security by default. You can easily check this yourself. When you are connected to a WiFi network, it will often be shown in the WiFi connection settings. On a Macintosh, hold down the Option key and click on the WiFi signal icon to see what security type your connection is using.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Make sure you have the SPI Firewall of your WiFi router enabled and disable UPnP (Universal Plug and Play) if your router does not pass a stealth test, which you can find&amp;nbsp;&lt;a href=&quot;https://www.grc.com/x/ne.dll?bh0bkyd2&quot; target=&quot;_blank&quot;&gt;here at Steve Gibson&#39;s Sheilds UP!!&lt;/a&gt;&amp;nbsp;You can also check the full security of your router using Steve&#39;s complete test by clicking &quot;All Service Ports&quot; on the&amp;nbsp;Shields&amp;nbsp;UP!! Home page. With these two tests, you can make sure your router is not inviting in the bad guys.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
If you find you&#39;re not getting the signal&amp;nbsp;strength&amp;nbsp;you need from your WiFi or you discover your security is compromised, I&#39;m&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/p/blog-page.html#.Ucsq3z4_9Gw&quot; target=&quot;_blank&quot;&gt;here to help&lt;/a&gt;. Send me a&amp;nbsp;&lt;a href=&quot;https://twitter.com/dougkrug&quot; target=&quot;_blank&quot;&gt;tweet&lt;/a&gt;, drop me an&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/p/blog-page.html#.UcsrSD4_9Gw&quot; target=&quot;_blank&quot;&gt;email&lt;/a&gt;&amp;nbsp;or give me a&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/p/blog-page.html#.UcsrSD4_9Gw&quot; target=&quot;_blank&quot;&gt;call&lt;/a&gt;&amp;nbsp;and enjoy your tech on the deck this summer!&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: black; font-family: Verdana; font-size: medium; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; margin: 0px; orphans: 2; text-align: start; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;Image courtesy&amp;nbsp;http://www.freedigitalphotos.net/&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/6904844924930454127/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2013/06/improving-wifi-signal-and-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/6904844924930454127'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/6904844924930454127'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2013/06/improving-wifi-signal-and-security.html' title='Improving WiFi signal and security'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkRqQMApQ5aiy-DdK9FWD-8cK-BFaMlcfKaXCrSgbVUxinbZhnDFxs9PeVXlbNBrE_kZtZCwMXos8X_0Mwi7Mmjug7gt7QG9yDz55kSoRgAoZT7dw2GhAqHvwrIMEmFL8RR8zUgsFIDpcB/s72-c/WiFi+logo.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-9089283667404043939</id><published>2013-05-31T15:17:00.000-04:00</published><updated>2017-03-11T18:19:53.369-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="Cable TV"/><category scheme="http://www.blogger.com/atom/ns#" term="entertainment"/><category scheme="http://www.blogger.com/atom/ns#" term="finances"/><category scheme="http://www.blogger.com/atom/ns#" term="insurance"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="phone service"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>How much money are you OK losing?</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
If you were to ask most people how much cash they&#39;re OK with losing, the answer would be zero, but if some pocket change goes missing they&#39;re not overly distraught by the event. What if your business is overspending on technology by&amp;nbsp;&lt;b&gt;$410 per month&lt;/b&gt;? A bit disconcerting isn&#39;t it?&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
You can protect yourself from much hardship in life and business with insurance. It&#39;s money well spent when something unavoidable happens. Similarly, every business owner will have technology expenses that are unavoidable, but by simply having help to make the right choices, you can dramatically cut losses.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;i&gt;&lt;b&gt;&quot;Damages due to loss or theft have great potential to cause nearly immeasurable consequences&quot;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigFw_YsfnxS3ZBjEiX7u261UoQcPHA2-UvKHKwLDFO-VwsyR-a1Uy8zboI4B4RL02Z68odbNuYuivTKVi2SWzwvafdGkPrM5d71O_0aFtqNGhB5AGmSeScx2IW9C-gRRvBUBiRP7S7268/s1600/saving-money-phone-system.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigFw_YsfnxS3ZBjEiX7u261UoQcPHA2-UvKHKwLDFO-VwsyR-a1Uy8zboI4B4RL02Z68odbNuYuivTKVi2SWzwvafdGkPrM5d71O_0aFtqNGhB5AGmSeScx2IW9C-gRRvBUBiRP7S7268/s1600/saving-money-phone-system.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
The reality is, $410 per month is a low average. Most small business owners are needlessly overspending by much more than that amount every single month, because they have been misled into purchasing technology and services that&amp;nbsp;&lt;span class=&quot;s1&quot;&gt;&lt;u&gt;never&lt;/u&gt;&lt;/span&gt;&amp;nbsp;pay for themselves.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
If you&#39;re a small business owner, here&#39;s a list of the average amounts after taxes and fees you are likely spending on your technology, just to &quot;Keep the Lights On&quot; as it&#39;s said:&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;i&gt;&lt;b&gt;&quot;Many people don&#39;t know what they pay for individual phone, cable and internet services each month, and the amounts are staggering&quot;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;$101/month&lt;/b&gt;&amp;nbsp;for a single&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2012/08/how-much-do-you-pay-for-phone-call.html&quot; target=&quot;_blank&quot;&gt;small&amp;nbsp;business line&lt;/a&gt;. Possibly more if you use a mobile phone exclusively (don&#39;t forget those long distance charges and fees). This doesn&#39;t include your home phone, so often the bill is well over&amp;nbsp;&lt;b&gt;$200/month&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;$73/month&lt;/b&gt;&amp;nbsp;for internet access&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;$180/year&lt;/b&gt;&amp;nbsp;for Microsoft Office&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;$1250/year&lt;/b&gt;&amp;nbsp;due to data loss. This is a very conservative estimate, actual financial losses could go into several thousands of dollars depending on your business, the amount of data lost and the&amp;nbsp;importance of the data lost.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Neglecting to&amp;nbsp;&lt;a href=&quot;http://solotravelerblog.com/travel-technology/&quot; target=&quot;_blank&quot;&gt;secure your privacy&lt;/a&gt;&amp;nbsp;on those &quot;Free&quot; WiFi hotspots and the&amp;nbsp;&lt;a href=&quot;http://solotravelerblog.com/travel-technology-cloud-technology/&quot; target=&quot;_blank&quot;&gt;security of any data&lt;/a&gt;&amp;nbsp;you store online. Damages due to loss or theft have great potential to cause nearly immeasurable consequences and permanent damage to your business and personal finances.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Don&#39;t forget to include what you spend on&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2012/12/htpc-or-how-i-learned-to-stop-worrying.html&quot; target=&quot;_blank&quot;&gt;Cable TV every month&lt;/a&gt;. For most, this is not a business expense, but it&#39;s a huge technology expense that is commonly forgotten about since it&#39;s usually bundled in with internet and phone. Many people don&#39;t know what they pay for individual phone, cable and internet services each month, and the amounts are staggering.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;p1&quot;&gt;
Without the right choices,&amp;nbsp;&lt;b&gt;you could easily be overspending by $5000 or more per year&lt;/b&gt;. No one wants this, but you either weren&#39;t aware of the better choices that add value for less money, you just don&#39;t have time or you don&#39;t know where to start.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;i&gt;This is where I can help you&lt;/i&gt;. On average you will&amp;nbsp;&lt;b&gt;&lt;u&gt;save&lt;/u&gt;&lt;/b&gt;:&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;$510 to $2100/year less&amp;nbsp;&lt;/b&gt;expense&amp;nbsp;for much&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2013/05/what-is-ooma.html&quot; target=&quot;_blank&quot;&gt;better phone service&lt;/a&gt;, with an incredible list of easy to use features.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;$475/year less&lt;/b&gt;&amp;nbsp;for fast internet with greater usage allowance&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;$180/year&lt;/b&gt;&amp;nbsp;less on Microsoft Office&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;$1150 to $1250/year less&lt;/b&gt;&amp;nbsp;thanks to secure data backup. The actual savings is much greater since you won&#39;t lose your work and time spent.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Potentially many&amp;nbsp;&lt;b&gt;&lt;u&gt;thousands of dollars&lt;/u&gt;&lt;/b&gt;&amp;nbsp;are saved by using&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2013/05/keeping-files-secure-in-cloud_20.html&quot; target=&quot;_blank&quot;&gt;secure means&lt;/a&gt;&amp;nbsp;to access and store data online.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;$800/year less&lt;/b&gt;&amp;nbsp;on average in&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2013/04/unblock-internet-no-streaming.html&quot; target=&quot;_blank&quot;&gt;entertainment costs&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;p1&quot;&gt;
In total, a very conservative estimated savings of&amp;nbsp;&lt;u&gt;&lt;b&gt;$4914/year is possible&lt;/b&gt;&lt;/u&gt;. This doesn&#39;t include potential savings by using&amp;nbsp;&lt;a href=&quot;http://www.ihelpinnovate.com/2013/05/web-conferencing.html&quot; target=&quot;_blank&quot;&gt;the right Web Conferencing software&lt;/a&gt;&amp;nbsp;instead of always travelling to client meetings. Put an end to paying huge monthly bills for technology, and put technology that pays for itself to work for&amp;nbsp;&lt;b&gt;you&lt;/b&gt;.&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;http://www.ihelpinnovate.com/p/blog-page.html&quot; target=&quot;_blank&quot;&gt;Contact&lt;/a&gt;&amp;nbsp;me and I&#39;ll help you make the right choices for you, and your business.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
647-391-4357 or doug@ihelpinnovate.com&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
Follow me on Twitter&amp;nbsp;&lt;a href=&quot;https://twitter.com/dougkrug&quot; target=&quot;_blank&quot;&gt;@dougkrug&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/9089283667404043939/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2017/03/if-you-were-to-ask-most-people-answer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/9089283667404043939'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/9089283667404043939'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2017/03/if-you-were-to-ask-most-people-answer.html' title='How much money are you OK losing?'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigFw_YsfnxS3ZBjEiX7u261UoQcPHA2-UvKHKwLDFO-VwsyR-a1Uy8zboI4B4RL02Z68odbNuYuivTKVi2SWzwvafdGkPrM5d71O_0aFtqNGhB5AGmSeScx2IW9C-gRRvBUBiRP7S7268/s72-c/saving-money-phone-system.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3633171899780417098.post-6265595013060751140</id><published>2013-05-20T12:34:00.000-04:00</published><updated>2017-03-11T11:59:47.097-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud storage"/><category scheme="http://www.blogger.com/atom/ns#" term="Intelligentsia"/><category scheme="http://www.blogger.com/atom/ns#" term="secure"/><category scheme="http://www.blogger.com/atom/ns#" term="Solo Traveler"/><category scheme="http://www.blogger.com/atom/ns#" term="Terracotta Soldiers"/><category scheme="http://www.blogger.com/atom/ns#" term="The Cloud"/><title type='text'>Keeping files secure in &quot;The Cloud&quot;</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgb56CN_QYiDpMeN6DhLvvp-qHVSU4QS7odYIvZQu1EPZNsj2oEgnegS2VCK_fFnQY5rM7qDZbY4S0Mitb5grb708niP69whMFG2b6GFbV4Oox-pouUjRkGaqLnPDXQpaai67ywW-SCNRor/s1600/Cloud+with+lock.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;br class=&quot;Apple-interchange-newline&quot; /&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgb56CN_QYiDpMeN6DhLvvp-qHVSU4QS7odYIvZQu1EPZNsj2oEgnegS2VCK_fFnQY5rM7qDZbY4S0Mitb5grb708niP69whMFG2b6GFbV4Oox-pouUjRkGaqLnPDXQpaai67ywW-SCNRor/s1600/Cloud+with+lock.png&quot; /&gt;&lt;/a&gt;Whether you&#39;re traveling to see the&amp;nbsp;&lt;a href=&quot;http://solotravelerblog.com/china-photos/&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;s1&quot;&gt;Terracotta Soldiers&lt;/span&gt;&lt;/a&gt;, or just to sit down with a Black Cat Espresso at&amp;nbsp;&lt;a href=&quot;https://www.intelligentsiacoffee.com/&quot; target=&quot;_blank&quot;&gt;Intelligentsia&lt;/a&gt;, having your files safe and secure online can keep you calm and in control when disaster strikes. Checkout my latest&amp;nbsp;&lt;a href=&quot;http://solotravelerblog.com/travel-technology-cloud-technology/&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;s1&quot;&gt;post on Solo Traveler&lt;/span&gt;&lt;/a&gt;&amp;nbsp;for tips on storing your&amp;nbsp;irreplaceable&amp;nbsp;documents on a cloud storage server and seamlessly keeping them locked for your eyes only.&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
If you want to know more about how to keep important documents, files and photos safe and secure from fire, theft or other disaster, please leave me a comment or send me a tweet&amp;nbsp;&lt;a href=&quot;https://twitter.com/dougkrug&quot; target=&quot;_blank&quot;&gt;@dougkrug&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://www.ihelpinnovate.com/feeds/6265595013060751140/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.ihelpinnovate.com/2013/05/keeping-files-secure-in-cloud.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/6265595013060751140'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3633171899780417098/posts/default/6265595013060751140'/><link rel='alternate' type='text/html' href='https://www.ihelpinnovate.com/2013/05/keeping-files-secure-in-cloud.html' title='Keeping files secure in &quot;The Cloud&quot;'/><author><name>iHelp</name><uri>http://www.blogger.com/profile/02318969620471669592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgb56CN_QYiDpMeN6DhLvvp-qHVSU4QS7odYIvZQu1EPZNsj2oEgnegS2VCK_fFnQY5rM7qDZbY4S0Mitb5grb708niP69whMFG2b6GFbV4Oox-pouUjRkGaqLnPDXQpaai67ywW-SCNRor/s72-c/Cloud+with+lock.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>