Archive for RB

More Tech Trouble at School

More Tech Trouble at SchoolIt’s not a good time for tech in schools. The security woes at school are not limited to the iPad debacle at LAUSD. (rb- You can see my coverage here – Updates since the first article – LAUSD started confiscating the iPads and delayed the district-wide roll out one year until 2015.) GigaOM’s Ki Mae Heussner writes that Guilford County Schools in North Carolina has suspended its tablet program with Rupert Murdoch’s News Corp’s Amplify after reports of faulty equipment.

NC school district suspends tablet program

uspended its tablet programThe district reportedly spent $16.4 million ($299 / device + a 2-year subscription at $99 per year) of a $30 million Race to the Top grant to pay for the tablets and content. The device is a 10-inch ASUS (2357) tablet running the Google (GOOG) Jellybean Android operating system. It comes pre-loaded with content and apps curated by Amplify. It enables teachers to distribute content across a class or grade level and control the content on students’ screens.

GigaOM cites the school district’s website, which says they have sent 10% of their 15,000 devices back to Amplify because of broken screens. About 2,000 cases have also been problematic. In one instance, a student returned a defective charger, reporting that overheating caused the plastic to melt. While the district said it expected a few glitches with the rollout, school officials decided to pause the program for safety’s sake. GigaOM claims the pause is a big setback for Amplify, which launched its education-optimized tablet at hipster South by Southwest earlier this year.

NewsCorpSince its launch, skeptics have wondered how schools would respond to the privacy questions and the prospect of doing business with Amplify’s parent company News Corp. (given its phone-hacking scandal). Ms. Heussner speculates that the suspension could give schools more reason for pause when it comes to embracing the new technology.

Asus told GigaOM that out of 500,000 chargers of its kind that they have shipped globally, only the one in Guilford overheated and melted. Justin Hamilton, Amplify’s SVP of corporate communications seems to be blaming the customer. He claimed the broken screen rate in Guilford is higher than in other school districts. “We’re working very closely with the district on this and hope to have things resolved and the program back up and running very soon,” Mr. Hamilton said.

Indiana mobile security fail

circumvented the security on district-issued Apple iPadsIn Indiana, Education Week reports that between 300 and 400 students in the Center Grove school district circumvented the security devices on district-issued Apple (AAPL) iPads within hours of receiving the devices according to a report last week in the Daily Journal.

Apparently, students found ways to reprogram the iPads so they could download games and apps for social media sites, according to the report. Center Grove officials attributed the problem to their security program not being able to handle the 2,000+ devices they distributed.

spread like wildfireKeith Krueger, the CEO for the Consortium for School Networking, said such problems are increasingly common as districts deploy an increasing number of devices. “Kids and adults find ways to hack through things, and it can spread like wildfire,” he said. “It’s frustrating, and it’s a huge challenge for any district.

Data center failures

In addition to the tablet troubles, Data Center Knowledge’s Rich Miller reports several school data center failures. According to DCK, two public school systems suffered data center failures that crippled their IT systems.

data center fire suppression systemIn Oregon, the Beaverton School District experienced several days of disruption after an errant alarm set off its data center fire suppression system. The fire suppression system damaged hard drives and servers. That left Beaverton schools unable to use email or access class lists, student schedules, and online textbooks. “It knocked all of the systems in the data center off-line,” said Steve Langford, chief technology officer. “All of the systems that staff needs to do their jobs.” District IT staff worked over the Labor Day weekend to replace the damaged systems.

In California, the Davis Unified School District started school without key IT services after the district’s servers overheated. DCK reports an air conditioner unit failed, allowing the temperature in the server room to rise to 120 degrees F. “There’s an incredible impact on everyone in the whole organization,” says the district’s Kim Wallace. “Students can’t access computers. Teachers can’t take attendance. Parents can’t email. We can’t email out.” The DCK article said staff were still troubleshooting damaged equipment and lost data.

rb-

The best strategy, COSN’s Krueger said, is to combine the best possible security filters and other technical measures with a comprehensive responsible or acceptable use policy that students and families must sign and a commitment to enforcement. “It’s not surprising that a school district would have some breaches,” he said. “The question is how do you leverage it into a teachable moment?”

Who needs the teachable moment? Sure the kids need to understand there are real consequences for their actions but, can the politicians administrators be taught to be serious about IT? Seems to me that most of these failures are management failures. It is probable that these failures could have been reduced with proper project management.

proper project managementIt is my experience that many administrators do not recognize project management professionals. It appears they would stick with the good ole boy network and hire their less qualified friends or the professional BSer’s.

Now about project management? Modern backup system? Disaster Recovery plan?  BCP?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

A Close Look at 802.11ac Wi-Fi

TA Close Look at 802.11ac Wi-Fiech pundits argue that the new Wi-Fi standard 802.11ac will replace wired gigabit Ethernet networking. 802.11ac is a supercharged version of 802.11n, offering link speeds ranging from 433 Mbps, up to multiple gigabits per second.

Wi-FiTo make 802.11ac dozens of times faster than 802.11n, the new standard works exclusively in the 5GHz band uses a huge chunk of bandwidth (80 or 160MHz), operates in up to eight spatial streams (MIMO), and a technology called beamforming.

At its core, 802.11ac is essentially an updated version of 802.11n, according to Sebastian Anthony the author of an ExtremeTech article “What is 802.11ac WiFi, and how much faster than 802.11n is it?” 802.11n was a huge performance increase over 802.11a and g. 802.11n introduced some key technologies that brought massive speed boosts. Where 802.11n had support for four spatial streams (4×4 MIMO) and a channel width of 40MHz, 802.11ac can use eight spatial streams and has channels up to 80MHz wide, which can be combined to make 160MHz channels. This means that 802.11ac has 8 x 160MHz of spectral bandwidth to play with, versus 4 x 40MHz – a huge difference that allows 802.11ac to send vast amounts of data across the airwaves.

Beamforming

What is new in Wi-Fi

802.11ac also introduces 256-QAM modulation (up from 64-QAM in 802.11n), which sends 256 different signals over the same frequency by shifting each signal to a slightly different phase. In theory, this quadruples the spectral efficiency of 802.11ac over 802.11n. Spectral efficiency is a measure of how well a given wireless protocol/modulation/multiplexing technique uses the bandwidth available to it.

802.11ac also introduces standardized beamforming Matthew Gast, Director of Product Management at AeroHive Networks published an article, “Investing in Beamforming: Is it worth it?” that explains beamforming.

Aerohive logoRather than transmitting a radio signal in all directions, beamforming figures out where the receiver is, and focus the energy towards the receiver. Instead of spraying radio energy all over the place, send packets as a “rifle shot” directly to the receiver’s antenna Mr.Gast explains.

Beamforming is a two-step process: First, figure out how to “aim” the transmission at the receiver, and second, send the transmission. With beamforming, a transmitter is betting that by paying the cost of the channel measurement process, the data transmission that follows will speed up enough to pay off the cost.

802.11n Beamforming was non-standardized, in 802.11ac, there is only one method of beamforming, called the Null Data Packet (NDP). (rb- Read the AeroHive article for a full description of NDP)

Aerohive’s Gast concludes that by steering the energy towards a receiver, beamforming enables you to take a step up to a higher data rate. Mr. Gast estimates that 802.11-based beamforming gives you a 3-5 dB gain.

802.11ac is speedyIn theory, at the 5GHz band with beamforming, 802.11ac should have the same or better range than 802.11n  However, Mr. Anthony says the 5GHz band, has less penetration power so it doesn’t have the same range as 2.4GHz (802.11b/g). The ExtremeTech article concludes that’s an acceptable trade-off: there simply isn’t enough spectral bandwidth in the cluttered 2.4GHz band to allow for 802.11ac’s gigabit-level speeds.

ExtremeTech‘s Anthony calculates there are two answers to how fast is Wi-Fi 802.11ac, the theoretical max speed, and the practical max speed that mere mortals will get surrounded by lots of signal-attenuating obstacles.

He calculates the theoretical max speed of 802.11ac is eight 160MHz 256-QAM channels, each of which is capable of 866.7Mbps – a grand total of 6,933Mbps, or just shy of 7Gbps. That’s a transfer rate of 900 megabytes per second. Compare this with 802.11n’s max theoretical speed, which was 600Mbps. He then says in practice, the current max speed of 802.11ac devices is 1.7Gbps.

ExtremeTech points out there will be a second wave of 802.11ac devices – due in 2014 after the standard is finalized – before 160MHz channels and multi-gigabit speeds become a reality. The max speed over an 80MHz channel is 433.3Mbps, and there aren’t any 802.11ac chipsets that support up to eight streams.

Broadcom logoKevin Fitchard at GigaOM reports that recently the Wi-Fi Alliance kicked off its 802.11ac certification program. First to get the official Wi-Fi stamp of approval was the Samsung Mega 6.3, followed by two other Samsung models.

As with the 802.11n certification process, the Wi-Fi equipment makers are moving faster than the standards bodies. The IEEE is actually still putting the finishing touches on the 802.11ac standard, which is not due until 2014.

Wi-Fi certifiedThe Wi-Fi Alliance expects the first batch of ac devices will support speeds of 433 Mbps and progress into more advanced levels of the standard. The Alliance has pre-certified systems from companies like Broadcom (BRCM), Qualcomm (QCOM), Realtek, and Marvell (MRVL). Cisco (CSCO) was one of the first vendors to get an access point certified.

“AC is going into mobile and portable devices first…,” Wi-Fi Alliance Marketing and Program Management Director Kelly Davis-Felner said. ABI Research estimates that 40 percent of all ac devices shipped in 2013 will be handsets.

rb-

Wi-Fi will replace wired Ethernet networkingWhile tech pundits argue that the new 802.11ac Wi-Fi will replace wired gigabit Ethernet networking at home and in the office. While the consumerization of IT and BYOD are strong forces, the life-cycle of cabling infrastructure is 25 years, a cost not lightly abandoned in the walls. it is more likely to happen at home first. Who wants all the crappy wires running all over the house?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Need Cyber Insurance?

Need Cyber Insurance?Standard business insurance does not cover data breaches or almost any other loss involving data. Standard insurance covers tangible losses and damage. Data isn’t tangible says Network World. The ruling that data is not tangible goes back to a 2000 ruling by a U.S. District Court. The article explains the ruling arose from an Arizona case, American Guarantee & Liability Insurance Co. vs. Ingram Micro Inc.. In that case, the court said that a computer outage caused by a power problem constituted physical damage within the meaning of the policy Ingram Micro had purchased from American Guarantee.

Courts ruled data is tangible propertyAfter that, the insurance firms changed their policies to state that data is not considered tangible property,Kevin Kalinich, national managing director for network risk at Aon Risk Solutions told Network World. The upshot is that an enterprise needs special cyber insurance to cover data-related issues. The problem is that the field is new and there is no such thing as standard coverage with a standard price.

Larry Ponemon, chairman of the Ponemon Institute, told Network World that the resulting complexity is a major source of push-back by potential buyers. “The policies have limitations and constraints similar to home policies with act-of-God provisions, and that has created a lot of uncertainty about what is covered, and what the risks are.” Mr. Ponemon told the author, “Those who are nevertheless purchasing cyber insurance are typically very selective about what coverage they want.”

Network World describes the types of cyber coverage available.

cyber coverages availableData breach coverage: This pays for expenses that result from a data breach. Covered expenses typically include notification of the victims, setting up a call center, credit monitoring, and credit restoration services for the victims, and other crisis management services, Ken Goldstein, vice president at the Chubb Group, told Network World. “You might want to hire forensic experts, independent attorneys for guidance concerning the multiple state (data breach notification) laws, and public relations experts.”

Regulatory civil action coverage: Pays in cases where the insured is facing fines from a state attorney general after a data breach, or from the federal government after a violation of the Health Insurance Portability and Accountability Act (HIPAA) or similar regulations. Some policies only cover the cost of defending against the action, while others may pay the fine as well, says Steven Haase, head of INSUREtrust, an Atlanta-based specialty insurance provider.

Cyber extortion coverageCyber extortion coverage: For cases where a hacker steals data from the policyholder and then tries to sell it back, or someone plants a logic bomb in the policy holder’s system and demands payment to disable it. Among other things, the policy should cover the cost of a negotiator, and the cost of offering a reward leading to the arrest of the perpetrator, Chubb’s Goldstein says.

Virus liability: Pays in cases where the policyholder is sued by someone who claims to have gotten a virus from the policy holder’s system.

Chubb logoContent liability: Covers lawsuits filed by people angered over something posted on the Web site of the policyholder. Such coverage should also cover copyright claims and domain name disputes, INSUREtrust’s Haase told Network World.

Lost income coverage: Replaces revenue lost while the policy holder’s computer system or Web site is down. But Aon’s Kalinich notes that insurers often apply minimum downtimes of 12 or 24 hours, or require proof of actual losses, “They’ll say that, after all, the customers who did not get through (during the outage) could have come back later.”

AON logoLoss of data coverage: Pays for the cost of replacing the policy holder’s data in case of loss, “Backup policies are not always effective, and accidents and sabotage happen,” Mr. Haase says.

Errors and omissions coverage: Otherwise known as O&M policies, this type of coverage predates cyber insurance, but is increasingly added to cyber policies to cover alleged failures by the policy holder’s software, Haase says.

Errors and omissions coverageAs for what coverage costs, Aon’s Kalinich told Network World that firms smaller than $100 million in annual revenue can expect to pay $5,000 to $15,000 per million of coverage, while larger firms would pay $10,000 to $25,000. For those over a billion, the price can be in the $20,000 to $50,000 range. Robert Parisi, senior vice president with Marsh, an insurance broker, and risk advisory firm put it simpler, saying the cost is between $7,000 and $35,000 per million. Of course, the lower ranges are for buyers who look like better risks — and deciding who is a better risk is another factor that makes cyber insurance a complex topic.

You cannot get good insurance unless you have good security practices,” VP Kalinich says. “Due diligence underwriting has become more streamlined as the insurers have learned what to look for. They will typically benchmark you against other members of your industry.

15% of the premium goes to commissionsINSUREtrust’s Haase explained the cyber insurance purchase process to the author, “This is a complex purchase and you need a professional helping you. Most policies are highly customizable, and there are a lot of endorsements.” Typically the buyer goes to their local agent, and the local agent uses a specialist, Haase says. Both the local agent and the specialist get commissions ranging from 7.5% to 10% so that 15% to 10% of the premium goes to commissions.

Finally, Toby Merrill, vice president of insurer Ace Professional Risk cautions that cyber insurance buyers must understand that if they are outsourcing their data handling, they are not at the same time outsourcing their liability if there is a data breach. The onus of the various breach notification laws is on the organization that gathered the data, not on the organization that was storing it when it was exposed, he notes.

Cyber insurance is not there to replace sound risk management,” VP Merrill told Network World, “It is there to supplement it.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Bye Bye Ballmer

Bye Bye BallmerThe next stop on the Farewell Steve tour takes up to Windows XP. The Verge reports that Steve Ballmer, who attended Lawrence Technological University in Southfield, MI before he moved on, had an hour-long town hall in the Microsoft (MSFT) HQ in Redmond to bid the MSFT worker bees adieu. At one point The Verge says an emotional Ballmer paused to “enjoy this for a minute,” with tears visibly streaming down his face. He told the audience “You work for the greatest company in the world, soak it in.

Here is another chance to enjoy the moment in an ad with Steve Ballmer and Brian Valentine in a Crazy Eddie spoof hawking Windows XP. If you listen closely at about 1:40, it sounds like Valentine even says Windows XP is secure!

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

How Does Caffeine Work?

How Does Caffeine Work? More than 80 percent of American adults drink coffee daily in such mundane settings as the office and in the car that we often forget it’s the world’s most popular psychoactive drug. The Smithsonian’s Surprising Science article This Is How Your Brain Becomes Addicted to Caffeine, reports that scientists declared caffeine chemically addictive in 1994. The latest edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM) included caffeine withdrawal as a mental disorder.

Caffeine is a naturally occurring chemical stimulant called trimethylxanthine, which in its pure form, is a white crystalline powder that tastes very bitter. Regular caffeine use alters your brain’s chemical makeup, leading to fatigue, headaches, and nausea for those who try to quit.

The article describes coffee withdrawal. Within 24 hours of quitting, withdrawal symptoms begin. Initially, they’re subtle: The first thing you notice is a mental fogginess, and lack of alertness. Muscles become fatigued, even when you haven’t done anything strenuous, and you suspect that you’re more irritable than usual. Over time, an unmistakable throbbing headache sets in, making it difficult to concentrate on anything. Eventually, as your body protests having the drug taken away, you might even feel dull muscle pains, nausea, and other flu-like symptoms.

Caffeine trainThe author explains the reason caffeine is addictive stems from the way the drug affects the human brain, producing the alert feeling that caffeine drinkers crave. Soon after you drink (or eat) something containing caffeine, it’s absorbed through the small intestine and dissolved into the bloodstream. Because the chemical is both water- and fat-soluble it’s able to penetrate the blood-brain barrier and enter the brain.

The article says caffeine closely resembles a molecule that’s naturally present in our brain, called adenosine (believed to play a role in promoting sleep and suppressing arousal)—so much so, that caffeine can fit neatly into our brain cells receptors for adenosine, effectively blocking them off. Normally, the adenosine produced over time locks into these receptors and produces a feeling of tiredness.

Caffeine and Adenosine

When caffeine molecules are blocking adenosine receptors it generates a sense of alertness and energy for a few hours. Additionally, Surprising Science notes some of the brain’s own natural stimulants (such as dopamine) work more effectively when the adenosine receptors are blocked, and all the surplus adenosine floating around in the brain cues the adrenal glands to secrete adrenaline, another stimulant.

For this reason, caffeine isn’t technically a stimulant on its own, says Stephen R. Braun, the author or Buzzed: the Science and Lore of Caffeine and Alcohol, but a stimulant enabler: a substance that lets our natural stimulants run wild. Ingesting caffeine, he writes, is akin to “putting a block of wood under one of the brain’s primary brake pedals.” This block stays in place for anywhere from four to six hours, depending on the person’s age, size, and other factors, until the caffeine is eventually metabolized by the body.

In people who often invoke this process (i.e. coffee/tea, soda or energy drink addicts), the brain’s chemistry and physical characteristics actually change over time as a result. The most notable change, the author says, is that the brain grows more adenosine receptors. This is the brain’s attempt to maintain equilibrium in the face of a constant onslaught of caffeine, with its adenosine receptors so regularly plugged (studies show that the brain also responds by decreasing the number of receptors for norepinephrine, a stimulant). This explains why regular coffee drinkers build up a tolerance over time—because you have more adenosine receptors, it takes more caffeine to block a significant proportion of them and achieve the desired effect.

This also explains why suddenly giving up caffeine entirely can trigger withdrawal effects. The underlying chemistry is complex and not fully understood, but the Smithsonian reports that your brain is used to operating in one set of conditions (with an artificially inflated number of adenosine receptors, and a less norepinephrine receptors) that depend upon regular ingestion of caffeine. Suddenly, without the drug, the altered brain chemistry causes all sorts of problems, including the dreaded caffeine withdrawal headache.

The article has good news, compared to many drug addictions, the caffeine effects are relatively short-term. To kick the habit, you only need to get through about 7-12 days of symptoms without drinking any caffeine. During that period, your brain will naturally decrease the number of adenosine receptors on each cell, responding to the sudden lack of caffeine ingestion. If you can make it that long without a cup of joe or a spot of tea, the levels of adenosine receptors in your brain reset to their baseline levels, and your addiction will be broken.

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.