Archive for RB

Seacrest Firm Takes on BlackBerry

– Updated 03-28-2014 – The Verge reports that Judge William Orrick granted BlackBerry a preliminary injunction halting sales of the Typo. In the ruling, Orrick said that BlackBerry had “established a likelihood of proving that Typo infringes the patents at issue and Typo has not presented a substantial question of the validity of those patents.”

Seacrest Firm Takes on BlackBerryFox reality television series host Ryan Seacrest has invaded the tech world. According to CiteWorld, the pop diva has become involved in a patent trolling spat with ailing Canadian smartphone producer Blackberry (BBRY). The site reports that Typo Keyboards, the Los Angeles-based company, co-founded by the “American Idol” host Seacrest submitted documents the U.S. District Court for the Northern District of California that claim in part that BlackBerry’s patent claims are invalid.

Ryan Seacrest

The start-up alleges that BlackBerry won’t suffer serious harm because its products aren’t selling that well anyway and that it has focused on the enterprise market while Typo is targeting consumers.

BlackBerry seeks a monopoly on keyboards for any device. Regretfully, however, small keyboards with nearly identical layouts as the one ‘claimed’

The author says BlackBerry could not immediately be reached for comment.

rb-

How that a pop star diva with the stature of Mr. Seacrest is involved in the wacky world of the mobile patent wars (Which I have covered many times), maybe we will get some new game shows like

What’s My Lie, or

The Patent Price is Right, or

3 Billion Dollar Pyramid Scheme

– I’m just saying. 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Cyber Attacks on Schools

Cyber Attacks on SchoolsCloud services and data-management systems are multiplying in the edu market. Schools, districts, and states are using online networks to store student data such as records PII, medical records, attendance, and grades. Putting all of this data online is scary enough, these systems are designed to allow parents (and attackers) to get to data from a home PC.

More convenient for teachers and parents

vulnerable to cyber attacksEducation Week explains that the switch to online data is often more convenient for teachers and parents. But these changes can also make state agencies, districts, and schools vulnerable to cyber attacks. The author cites the August 2013 DDoS attack on the Kentucky Department of Education’s statewide Infinite Campus information network as a precursor of things to come. The Kentucky agency was able to fight off the DDoS attack before any data was compromised but school DDoS attacks are occurring more often as they get easier to execute. David Couch the Kentucky Department of Education’s chief information officer said.

What I understand from what I’ve seen is that [DDoS attacks are] a commonality now … I think most organizations have to add to their tool suite a way to detect them.

Online attacks

DDoS attackGCN reports another edu DDoS attack. This one is on OnCourse Systems for Education a SaaS that provides software services to K-12 schools. The firm became the victim of UDP flood from Germany and the Netherlands. The firm tried to fly under the radar, Mark Yelcick, chief technology officer and partner at OnCourse said.

This was the first DDoS attack at OnCourse, and we never thought that we would be a target … There’s no money or assets to be gained by attacking an SaaS provider of K-12 educational systems. We felt that the firewall, intrusion protection and DDoS protection from our data center provider would be enough.

DDoS mitigation platformIn order to turn back the tide of rouge packets, OnCourse brought in Prolexic. Prolexic has solutions tailored for the education market. The company engaged its emergency services, routing traffic through Prolexic’s 1.5 Tbps cloud-based DDoS mitigation platform and stopping the attacks. CTO Yelcick said, “We simply cannot afford downtime brought about by a DDoS attack.”

Because DDoS attacks can target any IP address, it’s impossible to completely prevent them, so for districts and the companies that offer data management services, the focus is on battling these attacks as they come.

battling these attacks as they comeWe have to be prepared and understand the environment that we are operating in so we’re prepared to address these issues as they come up,” says Infinite Campus CEO Eric Creighton, the victim of the Kentucky DDoS attack.

Attackers are after student PII

Part of predicting and combating cyber attacks is understanding why people order these attacks in the first place. When the target is a network that stores student grades and attendance information, the immediate thought is that a student is responsible. However, Mr. Creighton says that students rarely attempt attacks and, in his experience, have never succeeded.

Report card“I don’t think these are attacks attempting to get data … There’s no jackpot of valuable data –there’s no payload here.” CEO Creighton may be spinning the results. rb- I wrote about schools collecting and losing PII here.

One reason that schools and districts are targeted is that their systems are designed for convenient access. Easy access for parents and teachers, makes for easier targets. Marcus Rogers, a professor, and chair of the cyber forensics program at Purdue University told Education Week.

For a lot of these attacks, the intended victim or goal is something bigger than the school. Obviously schools want to protect their data, but the bigger threat is when they use those networks now to go out and attack a power plant or a stock exchange or an air traffic control systems. That’s when the stakes go up.

Caused by a BYOD device

Kentucky education officials believe that the attack on their systems was triggered by a beacon. They hypothesize that a beacon was unknowingly placed on a student’s mobile device, which he or she took with them to school. Viruses can cause a device to send out a beacon, instructing thousands of other devices to attack the network the device is connected to. In Kentucky, officials say that this won’t stop individual districts from implementing bring-your-own-device programs. However, schools can decrease the chances of an attack by making sure that these student devices are properly protected according to Education Week. CIO Couch believes schools will start to protect themselves.

I think what you’re going to see is districts making sure that before people plug into their network they have up-to-date, good virus protection … I think you’ll start to see that in K-12.”

Purdue’s Rogers says that even when schools know best practices for avoiding and combating attacks, such measures are often cost-prohibitive. “A lot of times the schools know what to do, but at the end of the day if they’re trying to get library books, a firewall is not going to be their big concern.”

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Alien Super Channels Set Record

Alien Super Channels Set RecordResearchers have used alien technology to demo a broadband technology that can hit 1.4 terabits per second. That is enough to send 44 high-definition movies in just one second over the existing fiber network in London according to TechEye. A team from BT (BT) and Alcatel-Lucent (ALU) developed new infrastructure.

British Telecom logoThe BBC explained that the researchers used a new “flexigrid” infrastructure. Flexigrid created an “alien super channel.” The alien super channel was made of seven 200 Gbps channels, to vary the gaps between transmission channels. Increasing the channels’ density resulted in a 42.5% increase in the efficiency of data transmission compared with current networks.

Like adding more lanes of traffic

Kevin Drury, optical marketing leader at AlcaLu, told BBC news that the test was aimed at reducing space between lanes on a busy highway. He claims it is like adding more lanes of traffic to flow through the same path. He said that while wide lines can encompass heavy data transfers such as streaming video, narrow lanes would be assigned for low-data transfers such as standard web pages.

increase in the efficiency of data transmissionThe test was conducted on a 255-mile (410km) fiber link between the BT Tower in central London and BT’s Adastral Park research center in Suffolk. BT thinks it could help it to meet consumer and business demand for increased bandwidth.

rb-

Unfortunately, the mega-speed BT’s aliens developed is all backbone and core network stuff. It will not change the speeds we the people will get at home.

Am I the only one that has noticed that none of the new broadband speed records do not happen in the U.S.? The power of monopoly.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Twesume is Resume on Twitter

Whats A TwesumeSean Weinberg, COO, and co-founder of RezScore, a free web application that reads, analyzes, and grades resumes instantly, says that a 140-character Twitter resume could land your next job.  He calls it a Twesume.

Just like it sounds, “Twesume” unifies Twitter and your resume. The RezScore COO explains that a Twesume is a short bio or resume condensed into 140 characters or less. Sometimes paired with the #twesume hashtag, the Twesume can be tweeted, messaged or emailed to potential employers.

Mr. Weinberg told Mashable the great thing about the Twesume is that it’s a completely flexible, living document. Did you get promoted? No problem, just tweet the addition to your resume. Relocate? Totally fine.

Twesumes help job seekers get noticed by companies who use social recruiting. With the Twesume, a job seeker can introduce himself and engage with an employer in less time (and space) than a traditional resume and cover letter could ever manage.

If you’re interested in jumping on the Twesume bandwagon, all you need is a Twitter account and something to say. Once you have your Twitter account squared away (be sure to have a picture, bio, and some followers/followees), write your very own Twesume. While the Twesume can be anything you like, try to include this information: what you do, an accomplishment, a goal, skills, and/or a link to a detailed profile or website.

Santa Claus: World traveler and toy expert. 300+ years of management experience. Looking for a position in the entertainment industry. http://tinyurl.com/c9ursdp #twesume

Tweet this to your followers, DM to a specific employer, or use it as your Twitter bio. It really is as simple as that.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

A History of Encryption

A History of EncryptionYour personal information is under attack from the Feds, Target, Neiman Marcus, and who knows else. One of the keys to keeping your personal information personal are secure passwords. But what makes a password secure? America Online (AOL), (rb- Yes they are still around) explains the concept of encryption (converting information into code) is not new.

In fact, as you can see below, encryption started with the Spartans in 500 B.C.  Yhey would rearrange the position of letters within a text. Through the years, this process has become more sophisticated, which brings us to Advanced Encryption Standard, or AES, which is what we use today. This standard is based on computing bits, basic units of information. The bits in passwords are what help to keep your data secure. Check out the infographic to see how encryption has evolved from 500 B.C. to the present day and their tips for keeping your passwords safe.

 

A history of encryption Infographic

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.