Archive for February 14, 2012

Schools Riskiest for Computer Theft

Schools Riskiest for Computer TheftAbsolute Software Corporation (ABST), is a Vancouver, Canada-based computer security and end-point management firm. The company founded in 1993 provides firmware-based, computer theft recovery, data protection, and secure computer life-cycle management systems identified the top 10 target areas for the theft of mobile computers.

Absolute Software logoThe maker of LoJack for Laptops told ITnewsLink that the top 10 list reveals that consumer computers are more likely to be stolen while at school or home. The list is based on theft reports filed to the Absolute Theft Recovery Team by Absolute customers over a one-year period. With the holidays approaching, Absolute is warning that the risk of computers being stolen from the home is higher than what many consumers perceive.

“The trends in this list may surprise some computer owners. They often think of security issues only when they are on the move,” said Mark Grace, vice president of consumer business at Absolute Software. “However, with schools and residences topping the list of places computers are stolen, owners need to be extra cautious, particularly around the holidays when home burglaries often increase.

Top 10 Places Consumer Computers Are Stolen

Typing class1. K-12 Schools
2. Residential Properties
3. Automobiles
4. Businesses/Offices
5. Universities and Colleges
6. Hotels and Motels
7. Restaurants and Cafes
8. Stores and Shopping Malls
9. Public Transit (includes taxis, buses, trains, etc)
10. Airports (terminals, security checkpoints, storage areas and airport restaurants

rb-

The Absolute software offers several advantages. When a device is reported stolen a signal is sent that freezes the computer and displays a custom message for whoever finds it. In order to prevent identity theft unauthorized users cannot access the content on the computer, and even delete files, including the operating system. If a computer is stolen, the Absolute Theft Recovery Team will work with local law enforcement to recover it.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Social Network Safety Tips

Social Network Safety TipsIn case you have lived under a rock, social networking sites are very popular. LinkedIn (LNKD) has over 100 million users; 1 billion tweets are posted on Twitter each week and Facebook is approaching 1 billion users. Despite these numbers, they also open users up to more computer viruses and online threats according to a report from Webroot. A Help Net Security article details a few of the threats social network users face. They include:

Social networking malwareBogus e-mails from “friends”: The blog warns that hackers lure users into taking actions they shouldn’t. They do this by making it seem as if a friend within their social network has sent them an in-network e-mail. Only the e-mail is from a hacker who’s hijacked the friend’s account.

Malicious links or bait: This type of scam involves personal messages to users. The messages encourage victims to click on a link. Doing so can do a number of things including sending users to a fake website. There they are prompted to download and install an executable file that turns out to be a virus that infects the user’s PC explains the author.

Identity theftIdentity theft: Social network users who share personal information with their entire network of friends leave themselves vulnerable to hackers. Oversharing details like birth dates, addresses, pets’ names, and other details make it easier for attackers to guess your password and access Yout profile based on the personal information shared reports Help Net Security.

To help increase your PC protection, Webroot advises users to install updatable Internet security software and keep a few simple rules in mind, such as:

Be skeptical – E-mails, friend requests, Web site links, and other items from sources you do not know could be malware.

Social networking privacyUse privacy settingsSocial Networking sites, such as Facebook and Twitter, offer privacy settings that let you control who sees your posts and personal information. Use them to control who access to your page, contact information, etc.

Protect your password – Choose your passwords wisely, incorporate numbers, letters, and special characters, and never use the same password at more than one site.

For those who may need new internet security software, you should select a program that has a multi-level security program to:

  • Block viruses, spyware, spam, Trojans, worms, rootkits, and keyloggers;
  • Make your PC invisible to hackers;
  • Encrypt passwords and remember them for you;
  • Offer multi-layer identity protection;
  • Provide firewall security.
Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Data Centers To Go Wireless

Data Centers To Go Wireless

MIT’s Technology Review reports researchers from IBM (IBM), Intel (INTC), and the University of California, Santa Barbara have come up with a way to improve data transmission in data centers. Heather Zheng, associate professor of computer science at UCSB who led the research says wireless is the answer to the in-rack cabling mess usually found in data centers. In their paper (PDF), the researchers say that transmitting data wirelessly within a data center would be simpler than rewiring data for tech titans like Google (GOOG), Facebook, or Twitter.

Line-of-sight connections

WiFi radio wavesThe earlier challenge for multi-gigabit wireless in the data center was it required a line-of-sight connection to be useful. Achieving the required data center speed could not happen in the maze of metal racks, HVAC ducts, and electrical conduits that make up most data centers.

TR reports that the researcher’s solution is to bounce 60-gigahertz Wi-Fi signals off the ceiling, which could boost data transmission speeds by 30 percent. Stacey Higginbotham at GigaOm points out that this could result in data transfers up to 500 Gigabits per second. She says current Ethernet cables in data centers are generally 1, 10, or maybe 40 gigabits per second.

60-gigahertz Wi-Fi for servers

Data center ceiling WiFiMs. Zheng and colleagues used 60-gigahertz Wi-Fi, which has a bandwidth in the gigabits-per-second range and was developed for high-definition wireless communications according to TR. However, it has its limitations, says Ms. Zheng. To maximize the bandwidth and reduce interference between signals, it needs to use 3D beamforming to focus the beams in a direct line of sight between endpoints. “Any obstacle larger than 2.5 millimeters can block the signal,” she says in the TR article.

One way to prevent the antennas from blocking each other would be to allow them to communicate only with their immediate neighbors, creating a type of mesh network. But that would further complicate efforts to route the data to the proper destinations, Professor Zheng told TR. Bouncing the beams off the ceiling directly to their targets not only ensures direct point-to-point communication between antennas but also reduces the chances that any two beams will cross and cause interference. “That’s very important when you have a high density of signals,” she says.

Flat metal plates placed on the ceiling offer near-perfect reflection. “You also need an absorber material on the rack to make sure the signal doesn’t bounce back up,” says Ms. Zheng.

Wireless can add 0.5 terabytes per second

Data centerAccording to Technology Review, the UCSB team worked with Lei Yang from Intel Labs in Oregon and Weile Zhang at Jiao Tong University in Xi’an, China, to simulate a 160-rack data center to see how the system might work. “Our simulation shows that wireless can add 0.5 terabytes per second,” she says.

IBM is also looking into using wireless technology in data centers, Scott Reynolds, a researcher at IBM’s T.J. Watson Research Center in Yorktown Heights, NY, who has been developing 60-gigahertz systems told TR. “These data centers are just choked with cables,” he says. “And so every time you want to reconfigure one it’s very labor-intensive and expensive.” But one problem with turning to wireless transmission, he adds, is that “you need to have hundreds of these wireless data links operating in a data center to be useful.” Since 60-gigahertz Wi-Fi has only four data channels, it’s important to configure the beams so they don’t interfere with each other.

Mark Thiele, the EVP of data center technology at Switch CommunicationsSuperNAP data center, told GigaOm that the research is worth following as low-latency networking inside the data center can be a bottleneck today for applications that range from financial trading to trying to move gigantic data sets around.

TR reports Ms. Zheng and her colleagues are now working on building a prototype data center to put their solution into practice.

rb-

Cable mess under a raised floorHaving just done a small data center cleanup, the idea is appealing. We pulled out 2 generations of cabling, IBM Type 1, and a bunch of Cat 3 multi-pair out from under the deck.

Ms. Higginbotham says the choice of 60 GHz for the data center is a smart move. Intel is pushing 60GHz for consumer use, under the WiGig brand (I wrote about WiGig in 2010 here). This means the chips would be cheap.

Some of the possible security issues raised by running Wi-Fi in the data center are tempered by using the 60Ghz range. She says if you are worried about someone standing outside the data center trying to eavesdrop on the data you are transmitting the 60Ghz, signals deteriorate rapidly.

Of course, change is hard and data center guys are going to have to learn wireless and top-of-rack switches would have to get radio cards installed. The Wi-Fi reflective panels would have to be installed on the ceiling of the data center and the servers would need a signal-absorbing surface so the Wi-Fi signals don’t continually bounce around the data center.

Just if you are confused about WiGig, Wi-Fi, and IEEE, EETimes says, “WiGig forged a deal with the Wi-Fi Alliance so its 60 GHz approach can be certified as a future generation of Wi-Fi. The group has aligned its technical approach with the existing IEEE 802.11ad standards effort on 60 GHz.”

Now if only they could do wireless electricity……..

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Never Check Email First Thing In The Morning

– Updated 03-18-12 – Science writer David Bradley on his blog ScienceText also recommends, “Avoid social networking and email first thing.” I know it works for me, I walk around and talk to staff before I get tangled up in the work everybody else wants me to do.

Never Check Email First Thing In The MorningSid Savara a widely regarded personal development trainer published 7 Reasons You Should Never Check Email First Thing In The Morning at his site sidsavara.com.

#1 – Ignorance Is Bliss … fully Productive – When it comes to email, ignorance is bliss. That’s why if you’ve got something important you want to make progress on, the author offers these four words for success:

SPAM computerDon’t check your email – As soon as you get in, work on something important for 30-45 minutes, and only then check your email. If you can stand it, wait even longer. The article suggests that as long as you’re ignorant of everything else that’s going on outside, you can concentrate on what you want to work on.

Any new information you get can cause you to get distracted.

#2 – It’s Not Your Todo ListMr. Savara you know what is most important for you to work on the first thing in the morning you should go ahead and do it! By checking email, you risk doing what someone else wants you to do. Or more bluntly, when you check your inbox, the emails you get are a to-do list someone else makes for you.

Who is in charge of your time – you, or the person emailing you?

Lack of Direction#3 – It’s An Excuse To Lack Direction – The author says that checking email is a low-priority activity and that you may be checking email first thing in the morning because your to-do list has gotten off track somewhere. He argues that when you don’t have a clear list of priorities, checking email becomes an urgent activity that you do at the expense of your important ones.

#4 – Reaction vs “Proaction” – When you check your email, you end up with more work to do – and because we’re in “check email” mode, we start replying to them at the expense of the task we were just working on. Rather than actively setting an agenda, email forces you to react to items as they come in – regardless of their true priority.

Mr. Savara says he prefers taking proactive actions. Work on the things that are important to you, regardless of whether they’re urgent or simply at the top of your inbox. Stop wasteful actions, and focus on productive actions instead.

social networking#5 – Searching For Excuses Blindly checking email (or Twitter, or Facebook, or any number iTime wasters) is usually just searching for an excuse to not do the work that must be done according to the author. Don’t fall into that trap. Don’t give yourself an out by checking your email for an excuse to fail. He urges, don’t check your email  – acknowledge the task you need to get done and do it.

Cross that bridge – it’s not going away.

#6 – There’s No Set Time Limit – Meetings get a bad rap for being a waste of time – but at least you usually know how long a meeting will last. But do you know how long you’re going to spend on email once you open your inbox, odds are you don’t know – or you’ll underestimate it.

The problem is, checking email only takes a minute but you can get sucked into follow-up activities that result from opening your email, and there’s no way of knowing how much time these will take. You have a set time limit for how many productive hours you have in a day don’t let email suck you in and cause you to devote more time to it than you can afford.

#7 – It Builds Expectation – A lot of people say, “But I have to check my email! People expect a response from me in the morning!” The author believes that there are some requests that need immediate responses, but they’re much less frequent than you might think.

TimeHe argues that people expect a response from you in the morning because you’ve always responded first thing in the morning and you’ve built that expectation. The more often you check email, the more often people will expect you to check it. Just stop checking it first thing in the morning, and people won’t expect it anymore.

Mr. Savara recommends the following email rules:

  • Only check if there is something specific you are looking for. Most important – don’t go fishing around. Check it with a specific plan, a specific email you’re looking for from a specific person.
  • Separate low-value emails via filters (“rules” in outlook) or separate email addresses so you don’t even see them in your inbox when you check
  • Set a time limit. Commit to checking for 5 minutes, just to look for that one piece of information – and have your exit strategy ready. Before you open your inbox, decide what you’ll do if 1) the email is there 2) the email isn’t there 3) the email is incomplete. Don’t be reactionary – proactively decide what action you will take based on the outcomes you expect.
Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.