Say Goodbye to IE 11 Woes

To see which version of IE you have click "Help" then "About Internet Explorer".
To see which version of IE you have click “Help” then “About Internet Explorer”.


I have written about this problem before and I wanted to take a moment to touch on it again. For some reason, Microsoft has decided with their two most recent versions of Internet Explorer (IE) to make a change on how their internet browser is deployed. Prior to IE 10 (9 and prior) version upgrades were listed as “recommended updates” which meant that users had to manually approve the upgrade. However as of IE 10 Microsoft has for some unknown reason made the decision to mark these major upgrades to IE as “critical”. This change results in IE being upgraded very often whenever your have your computer scheduled to download and install critical updates.

The problem here is that many applications today are built with HTML. Because of this the application relies on Microsoft’s Internet Explorer. Upgrades to IE very often make changes in programming that the application programmers have not accounted for.

This change by Microsoft often causes havoc to those who run applications through their browser and can result in applications no longer running correctly or crashing.

So what should you do if your IE has been upgraded and you are experiencing problems? Well the only thing you really can do is downgrade IE. This can be a little tricky so just follow these steps if you are having problems with IE 11 or 10.



1) Click the “Start” button & type “Programs and Features” in the search box.

2) Click “View installed updates” in the left pane.

3) Scroll down to the “Microsoft Windows” section.

4) Select “Internet Explorer 11 or 10” and click “Uninstall”.

5) Leave your PC alone until it asks you to reboot.

6) If you are downgrading from 11 and want to go to 9 you will probably have to follow these steps twice.

If you are not experiencing any problems with IE 11 these steps are of course not necessary.

Oh – by the way if you are using Windows 8 this is not possible. You are stuck with IE 11.

Share This:

Enhancing Your Digital Security

Your digital security is becoming more important and complex every day. This can be seen by these two recent events:

Over the holidays, hackers stole about 40 million debit and credit card numbers from Target customers and took personal information, including email addresses, phone numbers, names and home addresses, from about 70 million others. The investigation into the security breach continues. This week for example some debit and credit card numbers of Target customers from South Texas turned up in conjunction with the arrest of a pair of Mexican citizens this week.

Also this past week, Neiman Marcus said 1.1 million debit and credit cards used at its stores may have been compromised in a security breach last year. The good news here is that social security numbers and birth dates were not stolen and customers who shopped online were not affected.

There are a couple of things I recommend that can help in cases like above to protect yourself.

  1. Go “old school” and write “See ID” or “Check ID,” on the back of a credit card in place of a signature, as a cue to merchants to ask for identification before they process a transaction.
  2. Another “old school” trick is to use cash as much as possible in order to prevent credit card fraud.
  3. When shopping online only use reputable and established websites. Also you should confirm the online seller’s physical address and phone number in case there are questions or problems. If there is an email or pop-up message that asks for financial information while browsing, don’t reply or follow the link.
  4. Frequently change passwords on accounts that have personal information. The more complex the password, the better.
  5. Do not keep all of your cards together in your wallet or purse. Instead, only take with you what you need, especially when travelling.

These are just some tips to help protect your digital life.

If you have any ideas please post them in the comments here for others to see.

Share This:

Controlling “Auto Correct”

I am not sure about you, my fellow tech readers but from time to time, actually most of the time I am frustrated with the “auto correct” feature that wants to control my typing on mobile devices. This can be frustrating and sometimes even embarrassing. But what is “autocorrect” anyway?

The idea of autocorrect is in theory a good one because when you mistype a word autocorrect jumps in to offer what it thinks is the correct spelling. However, if the system does not recognize the word you type and you type a space, punctuation mark or Return and you are not paying close attention autocorrect will assume you want to use its suggested word. This can be very bad.

What follows is for iOS devices but there are similar changes you can make on Android and Windows devices as well.

To override this you can:

Take control of autocorrect on iPad, iPhone


Tap anywhere in the autocorrect bubble to reject the suggested word before typing anything else.

Tap the Delete key, retype the last letter and the suggested word disappears.

Both those steps will get rid of the suggested word — but they also teach iOS the new word, that’s great if you use that word a lot but isn’t so useful if you do not use it that frequently. Why? Because in future your device will suggest that word even when you want to write something else, and occasionally insert it when you’re typing in a hurry (or leave your spectacles at home).

It’s a triumph of convenience over good sense! What’s to be done?

Disable Autocorrect (above image)

If you want to disable autocorrect all together on your iOS device go to:

Settings>General>Keyboard>Auto-correction Toggle switch to Off.


Share This:

SkyDrive Becomes OneDrive

Microsoft’s cloud storage service is about to have a name change and although the change was somewhat forced on Microsoft I believe the new name actually makes sense and in the end works better then SkyDrive.I have been a big fan of SkyDrive since late 2011 and although I have been calling for better built in music integration, that aside Microsoft’s cloud storage service is one of the best available today, especially if you are a Microsoft Office user.

Now… just what happened with the name anyway?

What once was SkyDrive is now OneDrive.

What once was SkyDrive is now OneDrive.

Microsoft’s cloud storage service will be rebranded ”One Drive”. Last year the British Sky Broadcasting Group PLC files suit against Microsoft stating that they owned the “SkyDrive” name.  Microsoft deciding not to fight this one reached an agreement last July for an undisclosed sum, after the British Sky Broadcasting Group PLC won an initial case in a British court against Microsoft’s usage of SkyDrive as Sky Broadcasting Group holds a trademark for the name in Britain.

Under the terms of the agreement, Microsoft was given “a reasonable period of time to allow for an orderly transition to a new brand”. Microsoft, though has not said when exactly OneDrive would fully replace SkyDrive as the name of the service, but currently maintains that OneDrive brand is “coming soon”.

Microsoft’s cloud storage service will be rebranded ”One Drive” after British broadcaster BSkyB objected to the earlier name “SkyDrive.”

A settlement was reached by the two sides last July for an undisclosed sum, after the British Sky Broadcasting Group PLC won an initial case in a British court against Microsoft’s usage of SkyDrive as Sky Broadcasting Group holds a trademark for the name in Britain.

Microsoft, though has not said when exactly OneDrive would fully replace SkyDrive as the name of the service, but currently maintains that OneDrive brand was “coming soon”.

According to commentators, while the rebranding would not change the service’s logo – two blue clouds on a white background – it would align the name with other company brands. Microsoft also reports that other then the name change existing users should see no change or interruption as a result of this.


Microsoft unveiled the new name yesterday in the US, saying OneDrive conveyed the mission of the service, which was to let users access their important files from many devices by storing them all in one location. “We know that increasingly you will have many devices in your life, but you really want only one place for your most important stuff,” the company wrote in a blog post. “We believe the new OneDrive name conveys the value we can deliver for you and best represents our vision for the future.”


Share This:

Gmail Service Outage

gmailIf you live in the cloud you must expect these things…

If you use Gmail you were not imagining things. Shortly before 2 p.m. ET today Gmail service went down, leaving millions of Americans staring at their computers and phones and wondering how in the world they were going to survive the remaining hours of the work week.

UPDATE: As of 2:25 p.m., Gmail service is slowly returning to users. Thank goodness we appear to have made it through this brief national crisis.

Share This:

Science & Space Friday – A New “Cosmos”

This March FOX will be airing a new series Cosmos: A Space-Time Odyssey”  hosted by Astrophysicist Neil deGrasse Tyson. This is a new updated take on Carl Sagan’s brilliant 1980 series, “Cosmos: A Personal Voyage”. Although now 34 years old “Cosmos” remains one of the most popular mini-series’ to ever air on PBS. The original “Cosmos” was so far ahead of it’s time that many of the topics covered remain accurate, brilliant and inspiring.

More than three decades after the debut of “Cosmos: A Personal Voyage,” Carl Sagan’s stunning and iconic exploration of the universe as revealed by science, COSMOS: A SPACETIME ODYSSEY sets off on a new voyage for the stars. Seth MacFarlane (FAMILY GUY, AMERICAN DAD) and Sagan’s original creative collaborators – writer/executive producer Ann Druyan and astronomer Steven Soter – have teamed to conceive a 13-part docu-series that will serve as a successor to the Emmy and Peabody Award-winning original series.

More than three decades after the debut of “Cosmos: A Personal Voyage,” Carl Sagan’s stunning and iconic exploration of the universe as revealed by science, COSMOS: A SPACETIME ODYSSEY sets off on a new voyage for the stars. Seth MacFarlane (FAMILY GUY, AMERICAN DAD) and Sagan’s original creative collaborators – writer/executive producer Ann Druyan and astronomer Steven Soter – have teamed to conceive a 13-part docu-series that will serve as a successor to the Emmy and Peabody Award-winning original series.


Carl Sagan’s “Cosmos” mini-series first aired on PBS in 1980.  I was only 16 years old when I first watched this series and it awakened something within me. For the first time I realized that not just me, but our entire planet was just one very small part of a greater universe.

The original “Cosmos” is filled with powerful & thought provoking ideas which are rendered simply, so that they are understandable, even if you are only a 16 year old nerdy kid (like I was at the time). That’s why Sagan is such a revered figure to not just me — he gave us a simple  way to experience awe and wonder. Even now that I have outgrown the nerd in me – and I am flowing with awesome coolness Sagan’s outlook on our universe continues to engage. And it’s not just his TV show that continues to inspire people but also his 20+ engaging books which transverse everything from evolution to space colonization.

Perhaps my favorite segment from the original “Cosmos” is a very short narrative now known as “Pale Blue Dot”. I recommend that you turn everything else down for 3.25 minutes and watch this brilliant little segment by Carl Sagan….. and think.

Now that you hopefully have watched this short video here is a little history about the “Pal Blue Dot”. Carl Sagan worked with NASA on the Voyager 1 and 2 spacecraft programs. These spacecraft’s were each sent out in 1977 to the outer rim of our solar system to explore the outer planets. Sagan urged NASA to actually turn the front facing camera of the Voyage 1 spaceprobe towards Earth as it entered the influence of Jupiter. Most NASA engineers did not want to “waste” the energy or time to do this, but Sagan would not let his idea go and NASA relented.  So as Voyager 1 neared Jupiter in 1990 the camera was turned towards earth and snapped the above images, of our tiny little planet.

Side note: Voyager 1 continues to explore and is in fact now the farthest reaching evidence of humanity’s existence in the universe. Although it’s primary mission ended on November 20, 1980 the little spacecraft continues to function. On September 12, 2013 Voyager 1 crossed the heliopause and entered interstellar space. Which means it has left he influence of our sun and has journeyed out of the solar system.

Share This:

The Changing Web Landscape

2014 is going to be a challenging and exciting year for CIOs in local government. Although there are several high stake considerations for CIOs I believe that 2014 and 2015 will for many of us focus on the quickly changing web services landscape.

Web Services, Social Media and Mobile Platforms

Steve Jobs really did change the tech world back in 2010 and web services are continuing to adapt.

Steve Jobs really did change the tech world back in 2010 and web services are continuing to adapt.

Websites have been around a long time. The world wide web (www) was created 24 years ago (1990). I know that’s hard to believe – but it is true. Then in 1993 the world wide web went public and websites were born, which means they have been around for a very long time indeed. Since then websites continued to develop from what had been static text only pages to the dynamic sites online today. Fast forward to 2010 when something very exciting was introduced that changed the tech world forever. On April 3, 2010 the first iPad was released and people began using the web in ways never consider before.

Today many consumers use their tablets and smartphones more then their computers.

It is because of this radical change in how people use the internet – and what they expect from it that new ways of providing web services are simply necessary. I believe that organization’s websites, although remaining very important now only play one part in reaching out to their stakeholders. Web services must be available easily and effectively on mobile devices, either through “apps” or “responsive design”.  This will be challenging for organizations because technology services are complex and often expensive. However without adapting to these very real trends organizations will fall behind as consumers will simply go elsewhere for their information and products.

The challenge here for CIOs will be to reach out into these new unexplored directions to find the best mix of solutions while at the same time remaining financially responsible to their organization.

Share This:

Freeing up Space on Your Smartphone

Because our smartphones have become more important and utilized in our daily lives they can quickly start slowing down and having problems. Because these little mobile devices are used so much we really need to take care of them, just like our cars. With this in mind here are some steps to keeps you smartphone running properly.


These steps are a little different depending on if you are using a iPhone, Android or Windows phone but these steps should send you in the right direction.

Media doesn’t have to be stored on the device. Offload media to a PC on a regular basis.

Step 1: Identify memory used by media assets by opening the device Settings. Settings is reached by touching the Settings cogwheel-like icon. Then scroll through to the Storage section.

You’ll see a graphical representation of storage in use, along with available space.

Step 2: Determine where best to free up space. Take a look at the Pictures and Videos space used in particular. Look for the numerical value next to the descriptive label. Video and images, unlike music, often don’t need to be stored on the device and can be moved.

Tip: HD video is a major memory hog. Photographs and music are other forms of media that take up a lot of space.

Step 3: Open the Settings option within Storage on the device. The Settings button within Storage is indicated by a vertical three-block icon.

Step 4: Plug in a USB cable from the device to a PC and allow drivers to automatically install on the PC.

Step 5: Use the PC’s Windows Explorer to browse the files on the device. Drag and drop memory-hogging media files from the device to the PC. After performing the copy, delete the files on the device.

Tip: Video is in the Internal Storage, DCIM, Camera folder on the device.

As I mentioned at the start of this article different smartphone use slightly different methods. If your device allows the installation of an external SD card, look for an option to Transfer Data to SD Card.

Share This:

Microsoft’s Free Security Solutions

One of the recurring topics of this fine blog is of course cyber security. Today it seems as there are more cyber risks for all of us then every before. However ironically it is actually quite simple to avoid these security pitfalls.

  1. Think before you click. What I mean here is that only go to reputable websites and do not click on links or attachments in solicited email messages. We have discussed this many time so I won’t go much further here.
  2. Install, update and pay attention to the security protection software on your computer. Now what is unusual here is that for most consumers free security software is more then enough to protect you and this is what I want to cover here.

There is actually a wide ranging suite of Microsoft security tools and most users are unaware that they are offered for free, by Microsoft, some as part of Windows (out of the box) others available by download.

So here we go…

Malware, as Microsoft defines it

Microsoft divides malware into two broad loosely defined terms: malicious software and potentially unwanted software. The first category covers mostly self-replicating Trojans, viruses, worms, and similar code that infects your PC (typically for some evil purpose) and then seeks to infect other PCs.

The second category — potentially unwanted software — includes undesirable (and often hidden) apps such as spyware that surreptitiously tracks you, keyloggers that capture everything you type, and adware that force-feeds you popup ads. The somewhat clumsy phrase “potentially unwanted” is meant to suggest that you might not want the software if you knew what it really did.

These two categories aren’t precisely mutually exclusive. For example, some potentially unwanted spyware is also self-propagating, like a virus. What’s more, Microsoft sometimes uses the terms interchangeably. Still, these two categories will help you understand the main purposes of Microsoft’s security tools.

The Microsoft Malicious Software Removal Tool

What it is: Microsoft’s Malicious Software Removal Tool (MSRT; more info) is a basic antivirus program. It comes in all current versions of Windows — XP, Vista, Windows 7, and Windows 8. When you install Windows, MSRT is enabled by default.

What it does: MSRT automatically removes malicious software (viruses, worms, etc.) that, based on Microsoft’s internal research, is considered especially prevalent and dangerous to Windows users. MSRT currently targets about 200 of the most common malware types. You’ll find a list of them on the MSRT download page.

How it works: Windows Update automatically refreshes MSRT once a month (it’s always KB 890830), usually on the second Tuesday (aka Patch Tuesday). After updating, MSRT automatically runs, scanning your PC once and removing any active malware infections it finds. No user intervention is required.

One scan a month isn’t especially good malware protection, but you can also run MSRT manually any time you wish (see Figure 1). Simply enter mrt.exe in the XP/Vista/Win7 Start menu Search box or Win8′s Search window and press Enter. Once open, MSRT gives you a choice of quick, full, or custom scans. As you’d expect, the full scan is the most thorough.

Microsoft's Malicious Software Removal Tool

Figure 1. The Malicious Software Removal Tool is built into your copy of Windows, and provides basic protection against a selection of common malware threats.

If you want or need a fresh copy of MSRT, it’s available via download pages for the 32-bit or 64-bit versions.

Important to know: MSRT is a strictly post-infection tool. It detects and removes malicious software from already-infected computers — and only if the malware is active and running at the time of the scan. But as MSRT Support article 890830 clearly states, the list of malware it detects represents only “a small subset of all the malicious software that exists today.”

MSRT can’t prevent new malware infections. It also doesn’t target potentially unwanted software (again: spyware, adware, etc.).

Bottom line: MSRT is a “better than nothing” anti-malware tool. There’s no real downside to keeping it on your system — its footprint is small, its impact on system operations is negligible, and it can serve as a kind of last-ditch defense against some very common malware types, should they somehow make it into your system.

But you certainly shouldn’t depend on MSRT as your only or primary defense against malicious software; it’s an incomplete anti-malware solution.

Windows Defender (XP, Vista, Win7 version)

What it is: Windows Defender is a basic tool for guarding against potentially unwanted software. Windows Defender is installed by default in Vista and Win7, and it’s a free download for XP.

What it does: Windows Defender provides always-on, real-time protection against spyware, adware, keyloggers, and so on. It self-updates and runs automatically.

How it works: Windows Defender continually monitors your PC’s files and browsing activity. When it detects potentially unwanted software, it opens a dialog box and lets you decide whether to proceed with the installation. (For more information, see the related Microsoft support article or TechNet’s Windows Defender Guide.)

You can also trigger Windows Defender (shown in Figure 2) manually whenever you want to scan your PC for spyware and other potentially unwanted software, as a Defender support article explains.

Windows Defender

Figure 2. Windows Defender for XP, Vista, and Win7 offers real-time protection against adware, spyware, and similar potentially unwanted software.

XP users can download either 32-bit or 64-bit versions.

Important to know: Windows Defender doesn’t detect or remove viruses, worms, and similar malicious software.

Bottom line: Windows Defender complements Microsoft’s Malicious Software Removal Tool. And just like MSRT, it’s better than nothing. Together, MSRT and Defender are a sort of last line of defense — potentially helpful if no other anti-malware tools are active. Fortunately, superior tools are readily available (see next sections).

The all-in-one Microsoft Security Essentials

What it is: Microsoft Security Essentials is Microsoft’s all-in-one, consumer-security tool. It targets both types of malware — malicious software and potentially unwanted software. It’s a free download (site) for XP, Vista, and Windows 7.

What it does: MSE provides always-on, real-time protection for your PC. It detects and removes a wide range of malware. It’s also highly automated, operating with little or no user intervention (see Figure 3).

Microsoft Security Essentials

Figure 3. Operating almost entirely automatically, Microsoft Security Essentials (MSE) provides real-time protection against malware and potentially unwanted software.

How it works: By default, MSE runs continuously in the background whenever your system is on. It updates itself every day. Along with its real-time protection, it also runs scheduled scans of your PC’s memory and files. If you use its default settings, MSE requires almost no user input. But it’s also highly configurable, should you want to change its standard routines.

Important to know: MSE must be manually installed; it’s not built into any version of Windows. On MSE’s MS Download Center page, you’ll find 32- and 64-bit versions for XP, Vista, and Win7.

Typically, to avoid conflicts between AV products, a PC should run only one real-time, anti-malware/anti-spyware tool at a time. In other words, you can run MSE or Windows Defender, but not both at the same time. In fact, when MSE is installed, it disables Windows Defender.

In a similar vein, if you’re running some other always-on, anti-malware tool, you should disable or uninstall that tool before installing MSE. (MSE can’t disable non-Microsoft AV scanners.)

MSE’s principal weakness? It’s not especially adept at guarding against user error, as detailed in the April 7, 2011, Top Story, “LizaM*n infection: a blow-by-blow account.” If you click past security warnings raised by Windows, your browser, and/or MSE itself, MSE will step aside and let malware install. Moreover, based on recent antivirus testing, MSE is currently not among the top-performing AV products.

All of which means that MSE is not the ideal choice for casual or inexperienced Windows users, who are often more easily tricked into installing malware.

Bottom Line: In the right hands — primarily experienced Windows users — MSE is a fine, free security tool. I use it on my XP, Vista, and Win7 machines, and I’ve never run into trouble with an infection.

Windows Defender: Win8′s built-in security tool

What it is: Microsoft has a long history of confusing product names. In this case, the Win8 version of Windows Defender is nothing like the original Windows Defender for XP, Vista, and Win7. It is, in fact, effectively a renamed version of Microsoft Security Essentials.

What it does: In Microsoft’s own words, the Win8 version of “Windows Defender provides the same level of protection against malware as Microsoft Security Essentials.”

How it works: Win8 Defender is virtually identical to MSE in both appearance (see Figure 4) and function.

Windows 8 Defender

Figure 4. Despite its name, Win8’s built-in Windows Defender is really just a renamed and minimally altered version of Microsoft Security Essentials.

Important to know: Unlike MSE, Win8 Defender is built into the OS — so there’s nothing to download or install.

Bottom Line: Because Win8 Defender is really a rebranded version of MSE, I don’t recommend it for novices and inexperienced users. But it’s probably fine for anyone who takes the entire process of PC security seriously. I use it on my Win8 systems.

Two special-purpose cleanup tools

No software is perfect — that includes all anti-malware tools, from all vendors. Should your AV product fail and your system become infected, you need a powerful cleanup tool to find and remove the malware.

It’s also good practice to verify that Windows is truly free of malware — even if your full-time scanner appears to be working — by periodically running an AV tool that operates completely on its own.

Microsoft offers two such special-purpose, cleanup/verification tools. Microsoft Safety Scanner is exceptionally simple to use — just click and run. Windows Defender Offline is harder to use, but it employs the best possible techniques for detecting malware hidden at even the deepest levels of your system.

Microsoft Safety Scanner is a Windows security utility that thoroughly scans your PC (see Figure 5) to find and remove both malicious and potentially unwanted software. A standalone application, it’s active only when it’s actually running a system scan. (It’s not constantly on in the background.) That lets it coexist peacefully with whatever full-time anti-malware software you’re using.

Microsoft Safety Scanner

Figure 5. Microsoft Safety Scanner works independently of your other security tools and can clean an infected system — or verify that no malware is present.

Microsoft Safety Scanner is compatible with all current Windows versions: XP, Vista, Win7, and Win8. Its info/download page includes 32- and 64-bit versions.

Safety Scanner is extremely easy to use; simply download and launch it, and then select whether you want a quick, full, or custom scan. At the end of the scanning process, you’ll get a report of what Safety Scanner found and removed.

Windows Defender Offline (WDO) is Microsoft’s most powerful anti-malware tool for consumers. It’s a self-contained, downloadable utility that operates completely outside Windows. After you’ve downloaded and launched WDO, it steps you through the process of creating bootable media (CD, DVD, flash drive, etc.) and installing the WDO files. You then restart the PC with the bootable disc/drive.

Because WDO is both operating system and AV scanner, neither the Windows installed on the system hard drive nor any other software is active. Everything on the hard drive is effectively inert. This lets WDO detect malware that is in one way or another well hidden in the Windows system. Because it’s completely standalone, WDO can’t conflict with other security tools you normally use.

WDO targets a wide range of malicious and potentially unwanted software. In operation, it looks and functions almost exactly like Microsoft Security Essentials or the Win8 version of Windows Defender.

If WDO has a weakness, it’s in the task of creating the WDO media. If your system is having difficulty running because of an infection, you’ll need either a working system to build the WDO media or you’ll need to have media you created before the infection (in which case you might not have the latest virus signatures). If you have only one PC, I recommend putting the latest version of WDO on a flash drive once a month or so.

You’ll find both 32- and 64-bit versions of WDO for all current Windows versions (XP through Win8) on its info/download page.

Putting it all together

The following table (Figure 6) is your one-stop reference for Microsoft’s six desktop security tools. It concisely summarizes which Windows versions they’re for, which kinds of malware they target, and whether they’re for prevention or cleanup/verification.

Take your pick: they’re all free!

Desktop Security Tool Chart

Figure 6. Microsoft’s six desktop-PC security tools

Now if you made it through this entire article I am very proud off you.

Share This:

Improving Smartwatches

20131106_080105Ok here we are half way through the first month of the 2014 and one of the technology trends I am most looking forward to keeping my eye on is wearable technology.

I have been using, fairly regularly Samsung’s Galaxy Gear smartwatch since last October and I have some thoughts about what Samsung needs to do with this to find more success with consumers, and I will get to my ideas after the following quick overview.

Here are I am with 2 pieces of wearable technology/ Samsung's Galaxy Gear and Disney's new Magic Band.

Here are I am with 2 pieces of wearable technology/ Samsung’s Galaxy Gear and Disney’s new Magic Band.


The Samsung Galaxy Gear is one of the most popular smartwatches in the world right now thanks to Samsung’s extensive marketing. Despite only working the Galaxy Note 2 &3 and a few other Android devices, the Gear continues to be a strong seller. One of the biggest problems here is that it is priced a bit higher than it should be at $299.  The Galaxy Gear  comes in a variety of colors and features a color AMOLED display, built-in 1.9MP camera and allows for notifications from your phone as well as voice calls. The Galaxy Gear runs various applications for email, SMS and social networks while giving you access to S-Voice, camera functions, music control and more.

OK so Samsung if you are reading this – this is what you should do in the rumored upcoming next version.

  1. Remove the camera all together. This will allow the band to be smaller and more comfortable and will probably also allow you to make the watch itself slightly smaller.
  2. Reduce the cost of the smartwatch. Obviously removing the camera alone will allow for this.
  3. Social networking interrogation which was almost non-existent when the watch was first released in October 2012 has been improved with a couple firmware updates and third party apps but further seamless interrogation is needed here.

There you go Samsung, see it’s really not that hard. Most users do not need or want a camera on their smartwatch. At 1.9MP and the odd angle you must use it as a camera simply makes the additional size of both the band and price a serious hurdle to success.


Share This:

1 2 3 4