Archive for RB

How Much Caffeine in your Coffee?

How Much Caffeine in your Coffee?The Thrillist has created a chart that tells you exactly how much caffeine is in your chain store coffee. From Starbucks to Dunkin’ Donuts, these coffee cup pie charts give you information on just how much perk-me-up you are getting per ounce of Joe. While the ultra-potent “Death Wish” coffee comes in first with a mighty 54.2 milligrams / fluid ounce, McDonald’s coffee takes the last place with a miserly 9.1 milligrams / fluid ounce

How does your favorite coffee rank on this caffeine chart?

coffee cup pie charts

rb-

No Tim’s?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Is The Perimeter Dead?

Is The Perimeter Dead?Even while mobile, cloud, and software services are blurring the lines of corporate IT boundaries through deperimeterization, DarkReading recently asked out loud, if the perimeter is dead.

it's very hard to define the perimeter of any organizationThere are those who believe enterprises are wasting their security budget on perimeter protection. In fact, FierceTelecom reports that 57% of enterprises responding to a survey said they plan to spend $500,000 or more in 2014 to upgrade their firewalls to high-speed network interfaces. Security is the chief reason cited.

The perimeter is dead

It is no surprise that the answers varied according to the author. Hardliners have been hammering on the death of the perimeter for a long time now. “Perimeter security is no longer relevant to enterprises. With the mobilization of the workforce, it’s very hard to define the perimeter of any organization because mobile-enabled employees are connecting to the network from all over the world on devices of their choosing,” Thevi Sundaralingam, vice president of product management at Accellion told DarkReading. “Next-gen security needs to focus keeping content safe, not on defining a network perimeter.”

People are giving up on the perimeter

Then there are the cynical abandoners. “In my opinion, perimeter security is not dead — it just has been handled incorrectly for so long people are giving up,” Alex Chaveriat, a consultant at SystemExpert told the blog.

Network perimeterBut others believe perimeter protection still has plenty of relevance for enterprise IT, even if it means rethinking the role of the perimeter and how these defenses are deployed. Corey Nachreiner, director of security strategy for WatchGuard (a firm that sells firewalls) believes the perimeter is different but still relevant.

The perimeter will never die, it will just get more focused … Sure, our workforce is getter (sic) more mobile, which means we need to incorporate new security solutions. But let’s not fool ourselves. The perimeter will never go away.

The perimeter is different

WatchGuard’s Nachreiner believes that the new perimeter needs to focus on server infrastructure and data centers, and not endpoint users. He believes firms will have to work in a hybrid environment that bolsters the perimeter not replacing it. “Just because people are using mobile devices and cloud services doesn’t mean they won’t still have local servers and assets behind a relatively static perimeter.

Another argument for perimeter defenses, according to the author is network egress monitoring. Michael Patterson, CEO of Plixer International told the author that egress visibility is crucial to pinpoint large-scale breaches.

Ultimately, the bad guys need to pass through the perimeter in order to complete the exfiltration of the data they are trying to steal … Monitoring behaviors is playing a significant role in this area as is the reputation of the site being connected to. 

The perimeter is growing

exfiltration of dataCEO Patterson also explains that perimeter defense doesn’t necessarily have to be placed at the edge. He told DarkReading it may have more relevance inside the network to watch and block threats within the organization. It’s for this reason that Mike Lloyd, CTO of RedSeal Networks, says that rather than dying, the perimeter has actually grown in recent years. In the article he says;

Companies have more and more perimeters that are getting smaller and smaller … Regulation drives it: PCI demands internal “zones” of segregation. BYOD drives it: Once you let zany uncontrolled endpoint devices onto your network, you have to build zones to keep them away from internal assets. Security drives it: We’ve talked about defense in-depth for years, but people are finally doing it.

As a result, RedSeal’s Lloyd says, security practitioners, have more opportunities for controls. This, though, can be a blessing and a curse. The downside is complexity, more controls in more places … The aspirin for that headache is automation. Make sure that all the enclaves you designed are actually set up and maintained properly as change happens.

rb-
The last time I re-designed a network, we put a Checkpoint (CHKP) firewall in front the of server segment. We dropped it in, in transparent mode to collect the who, what, when, and why of people accessing data you should have heard the howls of protest.

Despite naysayers, many security experts believe perimeter defenses have relevance when deployed as a part of defense-in-depth.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Wearable Tech Takes Off

Wearable Tech Takes OffWith the recent release of the Google (GOOGGlass, interest in wearable technology has been on the rise. The impending Apple (AAPLiWatch counter offering will inevitably drive the hype-cycle for wearable technology into hyper-drive. FierceMobileIT cites forecasts from several vendors that predict the wearable tech market will explode.

Wearable enthusiasm

Google GlassesVisiongain believes that over the next five years, the wearable technology market will reach $4.6 billion, with “explosive growth and high adoption rates.”  The wearable technology market includes smartwatches, tech clothing, augmented reality glasses, mobile health devices, and fitness/well-being monitors. Visiongain says:

Due to these devices becoming increasingly cheap to manufacture OEMs are now devising ways to apply this technology to target the consumer market. With virtually limitless applications to a number of verticals, the wearable technology market represents a huge value proposition to all ecosystem members, from manufacturers to app developers and service providers.

Vital jacketIHS Research and Juniper Research share Visiongain’s optimism about wearable technology. IHS predicts that between 2012 and 2017 10 million smart glasses will ship, with a majority of units shipped in 2016. IHS optimistically predicts that shipments of smart glasses will increase by 250% per year.

Juniper Research predicts that wearable devices would be increasingly used in the enterprise. Enterprise wearables include terminal devices, scanners, display devices, and tracking devices. They can also be used for logistics, factory management, and production houses. Juniper projects that overall sales of mobile, wearable devices, and smart glasses will reach 70 million units by 2017.

Wearables will cut into tablets

IDC says wearable computing will cut into tablet sales. They believe wearable devices like Google Glass and smartwatches could hamper tablet sales. Shoppers may choose to spend their money on wearable technology instead of tablets.

Business Insider - Wearable shipment estimates

rb-

Smartwatches augmented reality glasses and even smart contact lenses will save time and increase productivity. These technologies will hit the bottom line of enterprises that choose to embrace this new technology.

Once widespread consumer adoption takes place, the enterprise is never far behind – whether it’s ready or not. Remember how quickly Blackberry’s were tossed aside in favor of more consumer-friendly smartphones? BYOD is evidence that staff members will take technology into their own hands if their employer isn’t providing what they want. 

Companies need to start thinking about policies on existing wearable technology. For instance, many companies who have regulations on using cellphones while driving can expand these to include wearable technology, which will come in handy since wearables could prove distracting.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

IPv4 Final Countdown Begins

IPv4 Final Countdown BeginsThe number of U.S.  IPv4 addresses is critically low. This means that you may no longer be able to get new IPv4 addresses. Jason Verge at Data Center Knowledge cites reports from the American Registry for Internet Numbers (ARIN). The keeper of U.S. IPv4 addresses is down to the final /8 (around 16 million addresses) and has moved into the final phase of its IPv4 countdown plan.

American Registry for Internet Numbers (ARIN)DCK explains that in Phase Four, ARIN will process all IPv4 requests on a “first-in-first-out” basis. Every request will undergo team review. Requests for /15 or larger will require department director approval, which may mean a longer turn-around.

Strategies delayed theIPv6 IPocalypse

Those in the know, recognized IPv4 had issues in the early 1990s. However new strategies delayed the IPocalypse. Owen DeLong, ARIN advisory council member, and director at Hurricane Electric explained. “Network Address Translation (NAT) was developed and Classless Inter-Domain Routing (CIDR) and some other technologies that allowed us to conserve addresses.

IPocalypseWhile those changes slowed address consumption down, DKC reports they did not stop the need for IPV4 addresses. Mr. DeLong explains that every Regional Internet Registry (RIR) has developed an “austerity policy.” Europe is more than one year into its austerity plan (rb- which I noted here).  For Asia Pacific it has been more than two years. Latin America and Caribbean Network and Information Center (LACNIC) is close to triggering its plan.

IPv4 address brokers and auction houses

In response to the shortage (and profit), a new industry of IPv4 address brokers and auction houses has arisen. Many of the IPv4 addresses have been assigned, though not necessarily used. The IPv4 marketplaces list the number of IPv4 resources that are still available. The blog says a company called Hilco Streambank launched an auction marketplace that provides liquidity for IPv4 address sellers and connects them with buyers.

auctions that provides liquidity for IPv4 address sellers and buyers.Broker IPv4 Market Group believes potential legal issues in this highly regulated space make such auctions not feasible. The article says an auction winner may end up not getting the approval to get the addresses they have won. Which would leave both the buyer and seller in limbo. Some bidders are illegitimate; no contract terms are established other than pricing.

Hence, brokers are stepping in to lend end-to-end IPv4 address transaction expertise. They help with marketing, sales, the transfer process, and the financial aspects. IPv4 Market Group also provides legal and technical advice. (rb- I noted the rise of IP brokering here)

Prices of IPv4 addresses will skyrocket

Mr. Verge says auctions and brokerages are band-aids. The space will run out, potentially causing the prices of IPv4 addresses to skyrocket and making a fast-track transition to IPv6 ever more urgent.

ARIN could hand out its last free IPv4 addresses by the end of 2014Mr. DeLong is not a fan of either brokerages or auction houses. He told DCK, “I’m old-school in this regard … I feel that the whole idea of treating address resources as a resale commodity is distasteful at best. These are a community resources that [were] handed out without charge on the basis of actual need for the addresses. It’s pretty clear to anyone who was around in the early days that if you had addresses you no longer needed, you were expected to return them to the community for use elsewhere. I regard these monetized transfers as being more of a necessary evil to bridge a (hopefully) short-term gap and not a desirable state of affairs.

Hilco Streambank CEO Gabe Fried responded to DCK’s concerns. “Our policy is that a buyer cannot close a transaction for any reason, we move on with the next highest bidder and prohibit that bidder from further participation … We’ve successfully completed numerous transactions that were initiated on our auction platform to the satisfaction of both buyer and seller. Additionally, the auction platform is designed only to automate the bid/ask portion of the transaction, and not to provide all of the post-closing transaction support. We still do that by hand, as we do with our traditional brokerage services.

by the end of 2014The ISOC provides some perspective on the urgency of getting your network off of IPv4. They calculate that one /8 of IPv4 address space is equivalent to about 65,000 /24s and ARIN has delegated an average of 92,000 /24s per year for the past three years. When you factor in that some of ARIN’s last IPv4 space is reserved, a /16 for critical infrastructure and a /10 to aid IPv6 deployment, the math indicates that ARIN could hand out its last free IPv4 addresses by the end of 2014 … if not sooner.

 rb-

I have covered the IPocalypse since 2009 and it seems to finally become a reality. IPv6 has been a non-issue for many of the engineers I have spoken with, .edu is flush with IPv4 but the rest of the world is not. 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Security From the Heart

Security From the HeartWe have all heard the horror stories of password management. Users choose the same weak passwords, trade them for chocolate bars. They keep track of them on post-it notes. Firms are negligent in managing weak passwords. Help Net Security wrote about the latest innovation in passwords from Canadian security start-up Bionym.

Bionym logoBionym created Nymi, a bracelet/wristband containing an ECG (electrocardiogram) sensor that “reads” the unique heartbeat pattern of the wearer. The bracelet will use the ECG to authenticate into electronic devices; cars, computers, smartphones, TVs, etc.

“It was actually observed over 40 years ago that ECGs had unique characteristics,” Bionym CEO Karl Martin pointed out to Tech Hive. “What we do is ultimately look for the unique features in the shape of the wave that will also be permanent over time. The big breakthrough was a set of signal-processing and machine-learning algorithms that find those features reliably and to turn them into a biometric template.”

When you clasp the Nymi around your wrist it powers on. By placing a finger on the topside sensor while your wrist is in contact with the bottom sensor, you complete an electrical circuit. After you feel a vibration and see the LEDs illuminate, your Nymi knows you are you and your devices will too. You will stay authenticated until your Nymi is taken off,” it’s explained on the firm’s website.

3-factor security

Nymi knows you are youThe Nymi functions on a 3-factor security system. To take control of your identity you must have your Nymi, your unique heartbeat, and an Authorized Authentication Device (AAD). The AAD could be a smartphone or device registered with their app.

No details about the bracelet’s security have been share on the site. Ars Technica’s Dan Goodin has pumped Martin for information and, so far, the news is good. Elliptic curve cryptography is used to ensure data traveling between the bracelet and the device is not monitored or intercepted by attackers. ECC also encrypts the handshake performed between the bracelet and the devices being unlocked.

perform remote, gesture-specific commandsThe Nymi also has motion sensing and proximity detection that allows users to perform remote, gesture-specific commands, creating a dynamic and interactive environment,” it is explained. “A simple twist of the wrist can unlock your car door.”

When it arrives, Nymi will offer three-factor authentication. The wristband itself, your unique cardiac rhythm, and a mobile device, like a smartphone or tablet. The Nymi hardware acts as a secure token that ties into the biometric. The wristband will need to check in with your smartphone or tablet at the beginning of the day.

rb-

The thing that excites me most about Nymi is its potential to get rid of passwords. I think the password has a limited shelf-life. Once wearable computing takes off, payment processing will be integrated with biometrics on the wearable devices, there will be no need for passwords.

Nymi will be compatible with the FIDO AllianceBionym’s Martin stated,   “[Killing the password] is one of our goals,” noting that the Nymi will be compatible with the FIDO Alliance.

FIDO, which stands for Fast IDentity Online, was created by PayPal and Lenovo (LNVGY) and now counts Google (GOOG) and Microsoft (MSFT) among its members. The alliance has set out to create the next-generation standard for identity verification. 

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.