Archive for RB

Box Beefs Up Backbone for Business

The evolution of Box from an idea to let its customers share and manage and access their content from anywhere to a cloud file-sharing and storage start-up to a business serving over 150,000 businesses, including 92 percent of the Fortune 500 continues. DataCenter Knowledge reports that half of Box’s activity comes from outside of the U.S. and 40% comes from mobile devices.

In order to support the growth, DCK says Box is touting Accelerator, its global data transfer network, as well as adding several key certifications in a bid to make its global enterprise customer base happy. Further infrastructure expansion lies ahead. “We really think we’re solving a problem for an end-user,” said Jeff Quesser, VP of Technical Operations for Box. “But we’re also solving an IT concern; they can get all the auditing, compliance they need. This can be run in a very safe way.”

With over 150 percent growth last year the company has had to tailor its service in the best ways possible to serve the enterprise crowd.  The blog says 50 percent of Box activity is happening outside of the US, either from international firms or U.S. enterprises with a global presence. Mr. Queisser told DCK. “Speed is absolutely critical. If you have sites all around the world, you need blazing fast download speeds.”

This enterprise customer need was the impetus behind Box Accelerator. The company has established upload endpoints in key global data center hubs featuring end-to-end encryption. The company has built patent-pending intelligent routing and optimization technology that delivers uploads 2.5 times faster on average. It has built a network that helps you get data into Box as fast as possible.

Box Global Data Transfer Network

Box Accelerator tweaks the TCP stack to get better performance. Mr. Queisser explained to DCK.

“(With) most consumer operating systems, networking stacks are not optimized … There’s the bandwidth delay problem. TCP is an amazing protocol, but wasn’t made for these types of distances and this kind of bandwidth. It’s a testament to how amazing the protocol is that it’s done what it’s done.”

The article says the biggest problem for Box is how to handle inbound traffic.

“What we’ve done is unique in that it’s optimizing inbound data … How do you ingest 100MB rather than send it out? The other piece is that we built these nodes, and a routing feedback loop technology.  It determines the fastest way to get to Box. Sometimes it’s an accelerator node, but there are times when direct is the fastest path.”

Accelerator started off small but has added nine new points of infrastructure. It’s a small footprint that provides a big performance boost. The goal is to have cloud-based endpoints in all regions. The article claims that Neustar conducted a performance analysis test and found that “Box had the lowest average upload time across all locations, about 66% faster than the closest competitor.

The company is also planning to apply this technology to file downloads. Accelerator has added speed to enterprise uploads, but the company told DCK it is looking to speed up downloads in a similar fashion. “We need to do that in a way where it’s encrypted and it isn’t cached,” said Mr. Quiesser.

ISO 27001It in terms of certifications, Box has recently added ISO 27001 and support for HIPAA. ISO 27001 is the international standard for information security management systems (ISMS) and demonstrates how the policies and controls put in place at Box protect user data.

rb-

Better performance and security are great things from a cloud vendor. But what impact does the NSA spying scandal is going to do on the cloud storage business model. There could be repercussions if vendors don’t cooperate.

What do you think? is the Box network ready for the enterprise?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

POTUS Declares War on Patent Trolls

POTUS Declares War on Patent TrollsPresident Barack Obama has declared that it is time to get tough on “patent trolling.” Paul Marks at New Scientist writes that when ordinary activities like using Wi-Fi in a coffee shop or updating smartphone apps provoke lawsuits you know something is seriously amiss with the legal system. Firms that buy up obvious patents that the US Patent and Trademark Office (USPTO) should never have granted in the first place are called patent trolls according to the author.

US Patent and Trademark OfficeThe troll then “asserts” these patents by threatening to sue businesses that infringe them. Many will then settle out of court and pay an often business-crippling license fee.

As followers of Bach Seat know, there are a number of patent troll lawsuits related to wireless.  In 2011, Boston University’s law school estimated that dealing with patent trolling cost businesses in the US $29 billion (rb- which I originally covered here).

Seal of the President of the United StatesPresident Obama says the cash should have been spent on generating products, services, and jobs. So the White House is asking Congress to force the USPTO to narrow the scope of patents within the next six months so that whole fields cannot be trolled. Mr. Obama also wants to prevent patents from being asserted against the users of technologies, like coffee shops, rather than manufacturers. The White House says trolls will have to come clean about their identity, and not hide their “abusive litigation and settlement extraction” behind a thicket of shell companies.

This is a bold step forward by President Obama, and if these legislative proposals are enacted the playing field will be leveled,” Alan Schoenbaum, general counsel for the troll-fighting web hosting firm Rackspace told New Scientist. What’s crucial, Mr. Schoenbaum says, is that the President’s changes make sure trolls have something to lose when they fail in court. In essence, the U.S. legal system is unbalanced. In the UK, for instance, the loser pays. “That keeps frivolous lawsuits down to a minimum,” he says. “But ‘loser pays’ is rare in the U.S.

Rackspace logoThe author asks how can patent trolls be identified? Rackspace’s Schoenbaum says there are plenty of ways, “Trolls don’t invent, make or develop anything. Between 70 and 90% of their patents are software or business-method patents, and in virtually all cases the patent is invalid.

But San Francisco-based, “patent buster” Gregory Aharonian, who invalidates patents by finding previous inventions using the same ideas, told New Scientist he thinks it will be trickier to identify patent trolls. He told the author, “It is going to be hard for Obama to deal with the troll definition problem … Anyone who asserts an invalid patent, under any conditions, is a troll.” Mr. Aharonian says that some large technology firms behave like trolls when they assert overly broad or obvious patents they never exploit.

The only move that will crush the troll phenomenon is vastly improved patent quality, Mr. Aharonian says. “What upsets people Stack of moneymore is not the assertion tactics, but the crap being asserted.”

 rb-

This story barely had a full news cycle. The opportunity is dead and lost as the White House spin machine deals with the PRISM spying scandal.

Related articles
  • Stop Patent Trolls (sweenylegal.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Quantum Encryption for Grid Security

Quantum Encryption for Grid SecurityVulnerabilities in the national grids and the potential for wide-scale outages have raised concerns over the past few years as high-profile companies have gone public with highly advanced hacking attempts. MIT‘s Technology Review reported on GridCOM Technologies, a startup that recently secured seed funding from Ellis Energy Investment which says quantum cryptography can make the electricity grid control systems secure.

Quantum cryptography

Quantum entanglementDr. Duncan Earl the chief technology officer of GridCOM Technologies told TR he plans to use the start-up money to build a prototype quantum encryption system designed specifically for the electricity grid. The company’s hope is to show a working system working next year near its home base in San Diego. Utilities would pay about $50 a month for access to a software service and hardware that encrypt critical communications in an area.

With GridCOM Technologies, Dr. Earl is trying to make critical infrastructure more secure by encrypting data sent to grid control systems. The article explains that traditional encryption techniques can’t work at the low latency speeds—measured in milliseconds–required for SCADA systems, which leaves them vulnerable to attack. CTO Earl is an expert in optical technologies who worked for the Cyberspace Sciences and Information Intelligence Research group at Oak Ridge National Laboratory and helped spin out an optical lighting company in 2006.

Quantum entanglement

twin photonsGridCOM Technology’s system works by generating two photons using a laser and storing them in optical fiber cables. These twin photons each have an opposition polarization—either a wave oscillating up and down or left and right, Dr. Duncan explained to the author, Martin LaMonica. According to quantum mechanics, if one tries to measure these photons, it will change the state of the other and the photons are no longer “entangled.” This phenomenon allows a communications system to detect if a message has been intercepted.

According to the article, the firm’s service would create an encryption key based on the arrangement of the photon pair. A hardware receiver posts that information on the Internet and the company’s hosted software will poll those devices. A subscriber to the service will be able to confirm that communications haven’t been tampered with and encrypt messages, Mr. Duncan says. “You’ve got physics that is ultimately securing the device, not mathematics. Mathematical complexity has been a great tool for encryption but it’s not future proof,” he told TR.

GridCOM’s Duncan says a key advantage of the system, is that it works quickly, a necessity for SCADA systems. “You’ve eliminated the possibility of somebody eavesdropping to hack the key. There’s no data latency and you’ve leveraged a random bit stream … That’s really all the grid needs.

Quantum Encryption

 

Limitations

One of the main limitations is that the cryptography is only point-to-point over a fiber cable and can’t work across switching equipment over the Internet. In GridCOM Technology’s case, the system is limited to 20 kilometers in distance. GridCOM’s CTO envisions that utilities will put a series of hardware receivers in secured buildings to encrypt communications for a whole region. There are already a number of efforts to build commercial quantum encryption systems GigaOm reported on the success that the scientists at Los Alamos have had running a quantum network for over two years and ID Quantique in Switzerland.

TR concludes that quantum encryption offers one promising route to securing the grid, but it shouldn’t be seen as a silver bullet. If it works, it would address one very specific application but securing something as complex as the power grid requires a full suite of options and above all good security practices.

Smart Grid Today provides (PDF) some background. Quantum physics was first described in a 1935 paper that included Albert Einstein as an author. Erwin Schrödinger coined the quantum term “entanglement” and that was the basis for his famous thought experiment of a cat that exists simultaneously in a state of being alive and dead.

CERN to prove quantum entanglement, utterly confounding Einstein’s theory of relativity because now information can be transmitted not at or below the speed of light, but literally instantaneously.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

iDEN Shutdown is a Massive Recycling Project

Sprint iDEN Shutdown Makes Massive Recycling ProjectSprint Nextel (S) is set to shut down its Nextel iDEN network to make room for LTE. The shutdown will result in nearly 30,000 iDEN installations being taken off the air. All of that ewaste needs to be part of a recycling Project.

FierceBroadbandWireless explains that Sprint has deployed FDD-LTE using the 1900 MHz Band 25 spectrum. Sprint holds two 5 MHz channels in the G band adjacent to the PCS spectrum. The carrier’s Band 26 800 MHz spectrum is currently used for CDMA as well as end-of-life iDEN service. Sprint will gain another two 5 MHz channels for LTE once it shutters its iDEN network on June 30 and re-purposes that 800 MHz spectrum for LTE.

Sprint without Nextel logoAccording to Sprint, its last full day of iDEN service will be June 29. Sprint said it will close switch locations “in rapid succession on June 30.” After the shutdown equipment will be powered down and backhaul at each cell site will be eliminated. Tens of thousands of iDEN cell sites will be deconstructed and taken off the air. Sites, where CDMA and LTE equipment are colocated, will be left intact, minus the iDEN gear, said Sprint.

100 million pounds of recycling

The shutdown will generate over 100 million pounds of leftover iDEN network gear. The equipment and materials include cables, batteries, radios, server racks, antennas, air conditioners, and other equipment. Much of the equipment s being staged for recycling vendors. Most concrete shelters housing iDEN cell sites will be crushed and turned into a composite for roads and bridges, said Sprint.

Recycling a nationwide wireless network is a huge undertakingThe iDEN recycling project is expected to continue into early 2014. “Recycling a nationwide wireless network is a huge undertaking, but one that we’re committed to,” said Bob Azzi, senior vice president-network. “The company has earned a reputation for environmental stewardship. The iDEN recycling effort extends our commitment.

The market for used iDen equipment is pretty limited. GigaOm points out that iDEN is a dying technology, and Nextel was the world’s largest iDEN carrier. iDEN’s sole manufacturer, Motorola Solutions, still supports the technology, and a handful of operators in North and South America, as well as Asia, still use it.

make money from recyclingThe recycling and reusing move isn’t just about PR. GigaOm says that Sprint can save significant money by reusing its tech. They could make money from recycling if it sells the scrap to a waste vendor. There are also some state laws that require the recycling of certain types of e-waste, particularly substances that could be hazardous material that could seep into a landfill.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

China Shuts Down Internet for Maintenance

TechEye reports that the Chinese government switched off the Internet last week. According to the article, the Chinese government flipped its kill switch on the great firewall of China when it became concerned that some citizens might remember the 24th anniversary of the massacre of protesters in Beijing’s Tiananmen Square.

Great Firewall of ChinaApparently, China has decided that the best way to commemorate the massacre is by declaring 4 June “internet maintenance day” when all loyal communists spend the day updating their servers while remaining unconnected to the net. According to the author, the government switched off the Internet so that the loyal network managers would not be bothered by too much net traffic.

Tiananmen Square Lego Duck Man

Those sites under maintenance include blogs and websites that might want to remember 4 June for reasons other than being a patch Tuesday. The Washington Post speculates the Chinese government’s “fool’s errand” of censoring the memory of Tiananmen Square, is due in part to last year’s Arab Spring. The article maintains that shutting down websites and censoring rubber duckies and Legos is part of Beijing’s reaction to the Arab Spring.

Despite the Internet shut-down TechEye reports that some sites were allowed to stay up. The Twitter-like Sina Weibo was working, as were the Chinese operations for MSN and Yahoo. For some reason, the dictionary website WordKu.com offered just one page: a definition for the word “encore”.

Tiananmen Square Lego Tank Man

rb-

I hope I’m not the only one that recognizes the ironic timing of the revelations of the Obama administration’s massive domestic spying campaign and the Tiananmen Square anniversary.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.