Archive for January 29, 2009

Multi-Gigabit Wireless by 2012

Multi-Gigabit Wireless by 2012A January 26, 2009, ScienceDaily article describes a new CMOS chip capable of transmitting 60 GHz digital RF signals. The new chip enables rapid wireless transfer of a high-definition movie from a PC to a cell phone. It was developed at the Georgia Institute of Technology‘s Georgia Electronic Design Center (GEDC).

There are many potential 60 GHz applications. Some applications are virtually wireless desktop computers, data centers, and wireless home DVD systems. The 60 GHz application would allow in-store kiosks that transfer movies to handheld devices in seconds. It also has the potential to move gigabytes of photos or video from a camera to a PC almost instantly.

Experts believe that this technology could yield high-speed, short-range wireless applications by 2012. According to Joy Laskar, director of the GEDC, “Consumers could see products capable of ultra-fast short-range data transfer within two or three years.” Ann Revell-Pechar, chair of the MIT Enterprise Forum of Atlanta Chapter says “Multi-gigabit wireless technology is widely perceived to bring important new wireless applications to both consumer and IT markets.” Darko Kirovski, senior researcher at Microsoft Research says “Multi-gigabit technology definitely has major promise for new consumer and IT applications.

Unprecedented short-range wireless speeds

Researchers have already achieved very high data transfer rates that promise unprecedented short-range wireless speeds-15 Gbps at a distance of 1 meter, 10 Gbps at 2 meters, and 5 Gbps at 5 meters.

The GEDC-developed chip is the first 60GHz embedded chip for multimedia multi-gigabit wireless use. According to Ms. Laskar, this new technology “represents the highest level of integration for 60GHz wireless single-chip solutions. It offers the lowest energy per bit transmitted wirelessly at multi-gigabit data rates reported to date.

Industry group Ecma International recently announced a worldwide standard for radio frequency (RF) technology that makes 60 GHz “multi-gigabit” data transfer possible. The specifications for this technology are expected to be published as an ISO standard in 2009.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Nortel Declares Bankruptcy

Chinese hackers had widespread access to Nortel's corporate computer networkUpdated 02-14-12 The Wall Street Journal reported that for nearly a decade before Nortel collapsed  Chinese hackers had widespread access to its corporate computer network.

According to the article, the hackers used seven passwords stolen from top Nortel executives, including the chief executive. The suspected Chinese hackers penetrated Nortel’s computers at least as far back as 2000 and over the years downloaded technical papers, research-and-development reports, business plans, employee emails, and other documents.

Updated 03-12-09 WirelessWeek is citing The Wall Street Journal is reporting that Nortel is in talks to sell its core wireless equipment business as well as a separate unit that builds telecom systems for offices, according to anonymous sources in the WSJ.

The WSJ reported that Nortel is talking to Nokia Siemens Networks, to sell its wireless business. Avaya and Siemens Enterprise Communications, a joint venture of Siemens and technology private equity firm Gores Group, are interested in the company’s enterprise unit. Cisco Systems reportedly looked at the enterprise unit but wasn’t expected to bid. Nortel declined to comment.

Nortel Declares Bankruptcy113-year-old Canadian technology firm Nortel filed for Chapter 11 bankruptcy today. Nortel’s losses in the third quarter ballooned to $3.41 billion and 1,300 people had to be let go. CEO and President Mike Zafirovski wrote on the company’s Website. “Most importantly, Nortel is still very much in business.

Next steps for the former Northern Telecom may include selling various business units or receiving a capital investment as a way to go private, According to Avi Cohen, managing partner at analyst firm Avian Securities, on TheStreet.com,The most likely bidders for Nortel’s assets are Ericsson, Huawei (002502), Nokia Siemens, and Cisco (CSCO). We believe Alcatel-Lucent (ALU) and Motorola are less likely bidders because they are struggling with their own challenges and would have a hard time financing such a purchase.

UBS analyst Maynard Um speculated on CED that the acquisition of Nortel by Huawei would be a possible outcome giving the Chinese firm a significant increase in market access in North America. However, this scenario may run into trouble with the Committee on Foreign Investment in the U.S. (CFIUS) regulations.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Audio SPAM in Your Luxury Import

Audio SPAM in Your Luxury Import

Toyota has announced that new Lexus vehicles will start being delivered later this year. The luxury car comes equipped with a system that can send voice messages sent directly from the automaker to its drivers. The “service” called Lexus Insider will let Lexus send audio messages to owners on whatever subject it chooses.

verbal spamReports say the tips could range from making the best use of the vehicles’ features to suggestions for a scenic drive. Jon Bucci, vice president of Toyota’s U.S. advanced technology unit says the Lexus messages can be highly targeted. The messages can be tailored for those who have a specific vehicle type or who live in a particular ZIP code, which seems like verbal spam to me.

William Matthies of Coyote Insight and a longtime consumer electronics executive opined in USA Today.  “You’ve got the same thing coming to your home now. It strikes me as the same thing” as junk mail. Assertions that the messages will be targeted and useful enough to appeal to particular drivers don’t impress Mr. Matthies. “They’re not claiming anything different than all direct marketers claim,” he says.

Perhaps, Toyota will drop the price of a Lexus, now that its customers are a captive audience to their marketing machine.

Related articles
  • Lexus: Made in America? (features.blogs.fortune.cnn.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Ransomware Gets Tougher

Ransomware Gets TougherAnti-malware vendor Trend Micro has noted an increase in ransomware. According to Wikipedia ransomware is a type of malware that encrypts the data belonging to an individual on a computer, demanding a ransom for its restoration.

This type of ransom attack can be accomplished by (for example) attaching a specially crafted file/program to an e-mail message and sending this to the victim. If the victim opens/executes the attachment, the program encrypts a number of files on the victim’s computer. A ransom note is then left for the victim. The victim will be unable to open the encrypted files without the correct decryption key.

Once the ransom demanded in the ransom note is paid, the attacker may (or may not) send the decryption key, enabling decryption of the “kidnapped” files.

Recently, Trend Micro Advanced Threats Researcher Ivan Macalintal reported that a new version of the GPcode ransomware has surfaced, It is said that Gpcode[dot]ag utilizes a 660-bit RSA public modulus. Attackers appear to be upping the ante, in early June 2008, another Gpcode variant, Gpcode [dor]ak, has been detected and researchers believe it utilizes an RSA encryption algorithm with a 1024-bit public key. “We estimate it would take around 15 million modern computers, running for about a year, to crack such a key,” writes Aleks Gostev, senior virus analyst at Kaspersky, on the company’s blog.

The rise of ransomware makes regular successful data backups even more important. With current backups, you can delete the files in question, restore them from your backup and let someone else pay the attacker.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.