Subscribe free to our newsletters via your
. 24/7 Space News .




INTERNET SPACE
SciTechTalk: Feel secure about your phone?
by Jim Algar
Washington DC (UPI) Feb 10, 2013


HP tightens worker rules for China suppliers
San Francisco (AFP) Feb 8, 2013 - US computer maker Hewlett-Packard said Friday it is cracking down on abuses of student workers and temporary labor used by its suppliers in China.

The move by HP came as Silicon Valley neighbor and rival Apple continued a program to improve conditions for employees at facilities in China that produce its coveted gadgets.

HP announced new guidelines for student and temporary workers in China intended to reinforce local labor laws and introduce "beyond regulatory expectations" for suppliers.

"Student and temporary workers are two very vulnerable groups within the Chinese workforce," said Sanna Johnson, executive director of the Center for Child Rights and Corporate Social Responsibility in China.

"They are often entering the workplace with limited experiences and support."

HP cooperated with the center on the changes.

"We have worked closely with leading Chinese stakeholders to develop our new student and temporary worker guidelines to ensure the highest standards of ethical workforce management," said HP senior vice president of supply chain operations Tony Prophet.

Along with mandating fair compensation, HP guidelines require that workers be free to quit or lodge grievances without facing reprisals.

The number of student workers must be limited to "acceptable levels" with the majority of employees having full-time status, according to HP. In addition, student workers' jobs must complement their primary areas of study.

HP said the new guidelines take effect immediately and that compliance will be tracked with ongoing audits as well as through a key performance indicator program that collects performance data about suppliers.

HP boasts an extensive supply chain that spans more than 45 countries and territories.

Apple last year ramped up its vigilance regarding underage workers, excessive overtime and other abuses at China plants contracted to make its devices.

You've lost your smartphone. Or more worrying, it may have been stolen. Like most people, you've entrusted it with more and more of your personal data. Your first thought: just how secure are those emails, contact list, work documents and that app to access your bank accounts?

Almost all smartphones offer some sort of "lock screen" option, many featuring a password, PIN or pattern of screen touches or swipe gestures the user can set up.

They offer a layer of security, to be sure, but are not foolproof, and some surveys have found fewer that half of smartphone owners have bothered to set up a lock screen option on their devices.

And since you're constantly using your smartphone in public, the method to unlock your phone could be visible to prying eyes.

"For example, a thief sitting on a bus may notice the four characters that an unsuspecting person entered on the person's smartphone," a patent application recently filed by Apple says.

The application, titled "Image-Based Authentication," suggests an entirely new take on securing a smartphone or other mobile device like a tablet computer.

The system, the application explains, would replace validation using text or touch by "(1) selecting at least one image that depicts one or more objects with which the user should be familiar, where the image is stored persistently on the computing device, and (2) displaying the image. An object may be a person's face, for example."

In other words, the security barrier intended to keep unwanted eyes out of your smartphone could be a picture of your favorite Aunt Claire, presented as your lock screen and requiring you to correctly identify who it is.

You know your Aunt Claire, of course; it's highly unlikely a thief does.

The patent application includes mention of "multiple rounds," suggesting layers of security by displaying more than one image that has to be correctly identified.

So, Aunt Claire; correct. Your dog Biscuit; correct. And that generic-looking shot of you on the beach? Malibu. Correct.

That would be a lot of text to enter, of course, so an image in the application suggests instead a list of possible identification answers could be presented along with the image; a convenient single tap on the right one would suffice.

Convenient is a significant word, and is likely why so many smartphone owners choose not to utilize any security technique. Who wants to have to enter a password, PIN or touch the four corners of the phone screen in a particular pattern every time the phone is whipped out?

So smartphone makers continue looking for ways to offer increased security for users they might consider convenient to use; fingerprint scanners and facial recognition using a phone's camera are being investigated by several manufacturers.

Still, whether it's a password, a swipe, a fingerprint or dearly beloved Aunt Claire, security will only work if the user uses it.

Which brings us back to the half of all smartphone owners who don't bother to secure the considerable chunk of their personal life they're blithely carrying about in public where it can be lost -- or worse.

Walking up to their bank's ATM, it's not likely they consider punching in their 4-digit PIN inconvenient. You'd think their smartphone -- and its contents -- are worthy of the same.

.


Related Links
Satellite-based Internet technologies






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








INTERNET SPACE
Sony faces challenge with new PlayStation
San Francisco (AFP) Feb 9, 2013
When Sony pulls back the curtain on the next-generation PlayStation videogame console, the world will see how much the Japanese consumer electronics titan has been paying attention. Sony could double-down on hardware to power even more realistic graphics and rich game play than the impressive specifications of PlayStation 3 consoles nearing the end of a life cycle started in 2006. Or, So ... read more


INTERNET SPACE
Building a lunar base with 3D printing

US, Europe team up for moon fly-by

Russia to Launch Lunar Mission in 2015

US, Europe team up for moon fly-by

INTERNET SPACE
How The World's Saltiest Pond Gets Its Salt; Implications For Water On Mars

Lockheed Martin Completes Assembly, Begins Environmental Testing of NASA's MAVEN Spacecraft

NASA Curiosity Rover Collects First Martian Bedrock Sample

Sampling Several Rock Targets

INTERNET SPACE
Supersonic skydiver even faster than thought

Ahmadinejad says ready to be Iran's first spaceman

Iran's Bio-Capsule Comes Back from Space

A Hero For Humankind: Yuri Gagarin's Spaceflight

INTERNET SPACE
Reshuffle for Tiangong

China to launch 20 spacecrafts in 2013

Mr Xi in Space

China plans manned space launch in 2013: state media

INTERNET SPACE
Progress docks with ISS

NASA to Send Inflatable Pod to International Space Station

ISS to get inflatable module

ESA workhorse to power NASA's Orion spacecraft

INTERNET SPACE
Ariane 5 Arrives At Kourou For 4th Automated Transfer Vehicle Mission

Rocketdyne Powers Atlas 5 Upper Stage, Placing New Landsat In Orbit

Arianespace Launches Six Globalstar Birds Using Starsem Soyuz

Final checkout underway for the Starsem Soyuz launch with Globalstar spacecraft

INTERNET SPACE
Direct Infrared Image Of An Arm In Disk Demonstrates Transition To Planet Formation

Kepler Data Suggest Earth-size Planets May Be Next Door

Earth-like planets may be closer than thought: study

Are Super-Earths Actually Mini-Neptunes?

INTERNET SPACE
New classes of magnetoelectric materials promise advances in computing technology

Mercury contamination in water can be detected with a mobile phone

Scientists team with business innovators to solve 'big data' bottleneck

Looking out for lasers




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement