Previous | Table of Contents | Next |
Apples Newton uses a program by Now Software to hot sink data between the PC and the PDAs. The uploaded files are more easily imported into other programs. The only drawbacks to the Newton are that it is for Apple products and the program is not yet available for the PC.
The HP Omni Go uses the GEOS operating system. GEOS is an integrated, DOS-based set of programs with a Windows look and feel. Data can be uploaded to a PC, but not downloaded because the unit does not come with a PC version and the current release of GEOS for the PC will not read the Omni Go files. Versions 2.1 of PC GEOS allows hot-sinked data transfers. The Pilot is the smallest and lightest of the three with a hot-sink cradle and a PC version of PDAs software. The software is very basic. Names, telephone numbers, appointments, and notes are all stored in separate programs and in text file format.
The current version of PDAs are a step closer to having an integrated PC-PDA. When hot-sinked data transfers are available in more usable PC file formats, PDAs may become more popular. In the meantime, for users who wish to use a PDAs for jotting quick notes, names, telephone numbers, and appointments, the PC will store the backup of the PDAs information. Data should not be entered on the PC to avoid hot-sink problems.
For high-risk users who are really concerned about their computer being stolen, there are a variety of lock and cable systems that make the computer almost a permanent attachment to the item to which it is locked. Prices and products vary greatly. Some universities write their name and serial number on the outside of their computer cases with steel cables on the case, monitor, and keyboard. This may work well for a desktop PC, but not for a notebook being transported in a car.
A motion detector in the computer is helpful, provided that it can be heard. Modern motion detection systems include Compuguard and LightGard. These motion detectors attach directly to the computer and are connected to a buildings security system. Compuguard sits inside the computer and LightGard transmits a light through fiber optic cable attached to the computer. With either device, when the computer is tampered with or removed from its location, alarms sound. Compuguard was developed by Smith Security Systems of Guelph, Ontario and is currently only available from them directly. LightGard, by Interactive Technologies Inc. in North Saint Paul MN, is available through the Alliance Security firm.
Notebook cases are light, soft, and have pockets and handles. They are also easily spotted by thieves interested in quickly reselling MCE. These cases usually have no locks, nor do they offer much protection to the MCE if it is dropped or banged. The old-fashioned briefcase is bulky, heavy, and hard, but is often has a lock that makes it difficult to get inside, and the hardness offers protection from drops and bumps.
The cost for a small, palm-sized cellular phone is very low right now to entice users who can be charged for airtime usage. Digital cellular phones offer more secure voice and data transmissions than traditional cellular phones.
Cellular phones use microwaves for voice transmission, and there is as yet inconclusive information as to whether cell phones cause any type of cancer. For concerned users who wish to avoid any potential medical hazards, a headset attachment can be used with a cellular phone. The headset holds the cellular phone away from the head and gives the user hands-free operation.
With a telephone line and a modem, users can call their home or office from anywhere and retrieve their messages. Computer and building security can be checked remotely. Voice, fax, and data modems allow the computer to become a voice-messaging center.
If used in this capacity, the computer will have to be left on all the time, so there should be a UPS, antivirus, and security program installed. There are also devices that activate lights, appliances, and heating sources from remote locations.
Users who are prone to forget to turn on their computers are in luck. Multi-Link Inc. has developed The Power Stone, a program that will not only turn on the computer, but any other device attached to it by way of telephone line as well. There is no surge protection in The Power Stone, so it should be plugged into a UPS or high-end power bar. This device will not work with notebook computers or similar electronic equipment that must be manually turned off after a power outage. The Power Stone unit must be attached to every device to work.
When computer equipment is stolen or damaged, the downtime could last days, weeks, and in some cases, months. Downtime costs a business money in lost sales or production time. In most cases, the cost of reducing the possibility of theft or damage is less than that of downtime.
Mobile computing is the fastest-growing area of the computer industry. Consequently, the costs for repair and replacement of damaged and stolen equipment are also rising. To safeguard new equipment, all the devices should be catalogued and the hardware should be tested right away to ensure that it works. Security software can then be loaded, followed by the users software. An orientation session with the user that includes information about security precautions is also helpful. It may take some time to initiate the procedures the first time, but it saves time and money later.
Whatever the size of the organization, the first step in securing new equipment is cataloging. As soon as equipment, such as a notebook or PDA, is delivered it should be cataloged. Two copies of the information should be made for each new piece of equipment. One copy could be placed in a binder for easy access, and the second copy could be placed in a fire-proof vault in another part of the building.
IS may want to photograph the equipment and record the serial number, manufacturers model number, and the supplier directly on the back of the picture. The organization may want to assign its own part number and attach it to the outside of the device and, for notebooks, make that part number appear as the hard drive label.
Information about manufacturers and suppliers can be recorded in a separate binder. It is helpful to record vendors addresses, warranty information, and telephone numbers. A section can also be designated for repairs required or problems with either the equipment manufacturer or supplier. This information can be used when reordering to determine whether the supplier and/or manufacturer are providing adequate service.
Previous | Table of Contents | Next |