Archive for September 26, 2009

Big Blue Props Up Broadband over Powerline

Big Blue Props Up Broadband over PowerlineBig Blue continues to support Broadband over Powerline (BPL) as a way to close the broadband divide in rural areas. According to an IBM Global Financing press release the division has established a financing agreement with DS2, a supplier of integrated chip technology for powerline vendor International Broadband Electric Communications’ Broadband over Powerline Regenerating Unit (BRU) smart boxes. The BRU’s are attached to an electric utility pole to provide high-speed Internet signals to residential customers via the electrical drop. IBEC is working with rural electric utility cooperatives to extend broadband access to ‘unserved’ customers mainly in the South, East, and Midwest.

This is not Big Blue’s first major BPL investment. Even as many industry pundits were reading BPL its last rites, IBEC signed a $9.6 million agreement with IBM to deploy BPL networks in Eastern U.S. electric cooperatives. The investment was heralded by the Utilities Telecom Commission (UTC) as a “major step forward in bringing broadband services to the residents of rural America.” At that time, IBM and IBEC said they were working with the Midwest Energy Cooperative to deliver broadband over powerline to area residents and businesses throughout the seven counties the utility serves.

rb-

Sounds to me like they are propping up their SmartGrid ecosystem in the upcoming battle with Cisco over the estimated $20 Billion a year electrical grid modernization market.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Malware Goes Green

Malware Goes GreenZDNet reports that malware writers have come up with a new social engineering angle. The bad guys have started mashing up two issues Green and Security to help spread their malware. CA has been tracking the emergence of new scareware called Green-AV Premier Edition 3.0.

Green malware social engineering attack

E-Waste RecyclingThe malware claims to be the “World’s First Antivirus Which Cares About the Environment” and “costs” $99.99, This attack plays on Green sympathies by promising to donate $2 from every purchase for saving the “Amazonian green forests.”

CA says that the effects of an attack from this malware are similar to those caused by most rogue security software.

Recommendations:

  • Keep your security software up to date
  • Never click on a link you did not ask for
  • Never purchase this type of security software since you could be giving your credit card information to fraudsters and making yourself a target of identity theft

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

802.11n Ratified -Yawn

802.11n Ratified -YawnToday (09-11-09) the IEEE Standards Board has ratified the IEEE 802.11n™-2009 amendment. This vote ends a seven year effort to, “enable rollout of significantly more scalable WLANs that deliver 10-fold-greater data rates than previously defined while ensuring co-existence with legacy systems and security implementations” according to the IEEE. The 560-page document describing 802.11n will be published in mid-October 2009. Bruce Kraemer, Chair of the IEEE Wireless LAN Working Group said in a press release,

The performance improvements achieved via IEEE 802.11n stand to transform the WLAN user experience, and ratification of the amendment sets the stage for a new wave of application innovation and creation of new market opportunities.

IEEE logoKelly Davis-Felner, marketing director of the Wi-Fi Alliance (WFA), told Network World that “The core interoperability is totally preserved with the [existing] draft certification program.” Ms. Davis-Felner says,  ”Existing draft-11n products should work seamlessly with future products based on the final standard. No existing products will have to be retested in the updated certification program.

Today’s ratification marks the high-point for other 802.11 wireless products. This approval will green-light the development and deployment of 11n products in the enterprise. There is no longer a reason for firms deploying greenfield WLAN’s to roll put anything but  802.11n. The WFA expects 11n shipments to rise to 45% of all 802.11 shipments in 2009. Reaching 60% in 2012 based on data from market researcher ABI Research. But how long will 802.11n last?

WiGig logoNetworkWorld is reporting that Microsoft (MSFT), Intel (INTC) and others have formed the Gigabit Wireless Alliance (WiGig). WiGig is to create anew wireless specification with a data speed of up to 6Gbps. WiGig is also actively involved with the IEEE’s 802.11ad task group. And if WiGig is to slow. James Buckwalter, a professor at the University of California San Diego has developed s a silicon-based amplifier that transmits 10Gbps wireless in 100 GHz frequency bands according to NetworkWorld. Coverage could also be over a kilometer, which beats traditional WiFi‘s 100 meters.

rb-

The formal ratification of the IEEE 802.11n standard is a good thing. However we have recommended that clients seriously consider this technology in greenfield installs with Wi-Fi approved 802.11n since the beginning of the year.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers and anything else that catches his attention since 2005. You can follow him at LinkedInFacebook and Twitter. Email the Bach Seat here.

Feds Still Want to Federalize Internet

Feds Still Want to Federalize InternetSenator Jay Rockefeller (D-WV) has released a revised version of his bill that would federalize the Internet (I covered this topic earlier here). The current draft would allow the president to “declare a cybersecurity emergency” on “non-governmental” computer networks and do what’s necessary to respond to the threat.

Feds Still Want to Federalize NetSection 3 (2) (B) Defines “Cyber” as any matter relating to, or involving the use of, computers or computer networks. Section 201 (2) (B), permits the president to “direct the national response to the cyber threat” if necessary for “the national defense and security.”

I think the redraft, while improved, remains troubling due to its vagueness,” Larry Clinton told CNETIt is unclear what authority Sen. Rockefeller thinks is necessary over the private sector. Unless this is clarified, we cannot properly analyze, let alone support the bill,” said Clinton, president of the Internet Security Alliance, which counts representatives of Verizon, Verisign, Nortel, and Carnegie Mellon University on its board.

 Senate Intelligence Committee Chairman JAY ROCKEFELLER (D-WV)A Senate source familiar with the bill told CNET that the president’s power to take control of portions of the Internet is comparable to what President Bush did when grounding all aircraft on Sept. 11, 2001. The source said that one primary concern was the electrical grid, and what would happen if it were attacked from a broadband connection.

Section 201 (5) the bill requires the White House to engage in “periodic mapping” of private networks deemed to be critical, and those companies “shall share” requested information with the federal government. The privacy implications of sweeping changes implemented before the legal review is finished worry Lee Tien, a senior staff attorney with the Electronic Frontier Foundation in San Francisco told CNET. “As soon as you’re saying that the federal government is going to be exercising this kind of power over private networks, it’s going to be a really big issue,” he says.

The language has changed but it doesn’t contain any real additional limits,” EFF’s Tien says. “It simply switches the more direct and obvious language they had originally to the more ambiguous (version)…The designation of what is a critical infrastructure system or network as far as I can tell has no specific process. There’s no provision for any administrative process or review. That’s where the problems seem to start. And then you have the amorphous powers that go along with it.

Rb-

If your network is determined to be “critical” by the Feds, there is likely a new set of regulations coming from the same people who are giving themselves failing grades for their own cyber-security.

These new rules could impact staffing decisions, disclosure policies and open the door to a government can take over your IT systems. This bill requires watching by anybody that uses or manages computers, a private network, or the Internet. It is likely they will sweep it in as pork on another unrelated bill, to limit public discussion.

Contact your representatives in DC.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Internet Over the Hill

Internet Over the HillThe Internet is 40 years old. On September 2nd 1969, in a lab at the University of California, Los Angeles, two computers passed test data through a 15-foot gray cable. The network became known as ARPANET. Stanford Research Institute joined the network a month later followed by UC Santa Barbara and the University of Utah by year’s end, and the Internet was born.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.