Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

My iPad 3G Issues

May 24, 2010

  • Blog
  • Archive
I am one of the few hundred thousand people that pre-ordered an iPad several weeks before its release. I pre-ordered the unit with 3G service and it arrived on the last day of April. Before it arrived, Apple had been shipping me all of the accessories that I pre-ordered. Thank goodness the iPad 3G is nothing like the accessories or I would have been in for a huge disappointment. Let me start with a docking station. It is about the same width as an iPhone, only supports the unit from the center and does not work with the Apple approved protective case. On the rear it has two cable connections: one for an audio line out and the other for a native Apple connector. There is no separate connector for a power cord; USB or otherwise. While you might think this is not unusual since the standard connector has a USB connection that will charge the unit, the VGA cable accessory has no power input. Nor, can you connect multiple Apple connectors into the unit at the same time. So when the docking station is used, with an external VGA monitor, you cannot charge the unit at the same time. So what is the point of the docking station? I will be forced to switch cables between USB and VGA just to charge the unit and have an external display and need to remove the protective sleeve in order to dock. Granted the battery life is actually better than the estimated 10 hours publicized, but that means on a full days use, I will be cycling the connectors twice in the morning and evening. In addition, if I choose to use the iPad to watch movies using the VGA HD output, I cannot charge it at the same time. And by the way, the best app killer for the iPad – Netflix does not support video out. The whole point of a docking station is to allow multiple inputs to the device at the same time while providing power. Just like missing copy, cut, and paste from the iPhone for over a year, Apple has missed the boat on providing basics for their highly touted devices; this time providing power and accessories for usability. So, in my quest to solve these problems, I turned to eBay. Since Apple has made their connector proprietary and changed the microchips in the 3G devices, many of the third-party devices and cables I was looking for are not compatible anymore. I really do like my iPad, but Apple designers need to give in a little. To that end, I recommend to any hardware developer the following:
1. Allow the device to receive external power regardless of the accessory; especially if something is marketed as the “Docking Station”. 2. Provide more than one connector for accessories; if not, follow standards like USB to all the connections to a PC to be standard and not use proprietary features to block out third-party vendors. 3. If you build an accessory, make it sturdy and fit the unit correctly. Making it look cool verses functional is just not acceptable (Apple add a fixed weight inside the iPad Dock to keep in stable since it is so small.)
The iPad 3G, is an incredible device and has use cases popping up every day for new applications. I am thoroughly impressed with the unit and found it is changing the way I surf the web, get email, and have overall entertainment. It definitely is a great tool for early adopters. However, based on the accessories, it feels more like the Apple Newton and needs to be set free and allow open connectivity for its true potential to be realized.
Photograph of Morey J. Haber

Morey J. Haber, Chief Technology Officer and Chief Information Security Officer at BeyondTrust

Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Webcasts

Rising CISOs: Ransomware, Cyber Extortion, Cloud Compromise, oh my!

Whitepapers

A Zero Trust Approach to Windows & Mac Endpoint Security

Whitepapers

Mapping BeyondTrust Solutions to the Qatar National Information Assurance Policy v2.0

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.