Discover how mastering email communication can boost business efficiency, avoid common pitfalls, and ensure secure, respectful online interactions.
Turkey Revenge
The turkeys are pissed this Thanksgiving they are seeking revenge.
Germs Infest 60% of Americas Phones
60% of Americans sleep with their phones, harboring germs. Cleaning regularly with UV sanitizer or alcohol wipes can help keep your phone and bed germ-free.
Smartphone Sanitizing: A Practical Guide
Securely erase personal data from your old smartphone before recycling. Protect your identity from hackers—easy steps to follow.
Why Soft Skills Matter in Today’s Job Market
Boost your career with essential soft skills like communication, teamwork, and emotional intelligence. Learn why they’re crucial for workplace success.
Hidden costs of BYOD
FierceMobileIT points out research from Visage Mobile has identified even more hidden costs in an informative infographic based on data collected between January and April 2013 from 180 companies.
These hidden costs include high roaming charges, as well as downloads of premium text services and sexting apps by employees. Employees download $13,640 worth of unapproved apps, ringtones, and premium services every month. As a result, 15 percent of a company’s phone bill has nothing to do with business, according to the research.
rb-
Ummm – Acceptable use policy? A deduct from their phone stipend?
Related articles
- BYOD Could Land Employees in Jail (rbach.net)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
Seacrest Firm Takes on BlackBerry
– Updated 03-28-2014 – The Verge reports that Judge William Orrick granted BlackBerry a preliminary injunction halting sales of the Typo. In the ruling, Orrick said that BlackBerry had “established a likelihood of proving that Typo infringes the patents at issue and Typo has not presented a substantial question of the validity of those patents.”
—
Fox reality television series host Ryan Seacrest has invaded the tech world. According to CiteWorld, the pop diva has become involved in a patent trolling spat with ailing Canadian smartphone producer Blackberry (BBRY). The site reports that Typo Keyboards, the Los Angeles-based company, co-founded by the “American Idol” host Seacrest submitted documents the U.S. District Court for the Northern District of California that claim in part that BlackBerry’s patent claims are invalid.
The start-up alleges that BlackBerry won’t suffer serious harm because its products aren’t selling that well anyway and that it has focused on the enterprise market while Typo is targeting consumers.
BlackBerry seeks a monopoly on keyboards for any device. Regretfully, however, small keyboards with nearly identical layouts as the one ‘claimed’
The author says BlackBerry could not immediately be reached for comment.
rb-
How that a pop star diva with the stature of Mr. Seacrest is involved in the wacky world of the mobile patent wars (Which I have covered many times), maybe we will get some new game shows like
What’s My Lie, or
The Patent Price is Right, or
3 Billion Dollar Pyramid Scheme
– I’m just saying.
Related articles
- How To Avoid The NPE Patent Toll (ceo.com)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
Cyber Attacks on Schools
Cloud services and data-management systems are multiplying in the edu market. Schools, districts, and states are using online networks to store student data such as records PII, medical records, attendance, and grades. Putting all of this data online is scary enough, these systems are designed to allow parents (and attackers) to get to data from a home PC.
More convenient for teachers and parents
Education Week explains that the switch to online data is often more convenient for teachers and parents. But these changes can also make state agencies, districts, and schools vulnerable to cyber attacks. The author cites the August 2013 DDoS attack on the Kentucky Department of Education’s statewide Infinite Campus information network as a precursor of things to come. The Kentucky agency was able to fight off the DDoS attack before any data was compromised but school DDoS attacks are occurring more often as they get easier to execute. David Couch the Kentucky Department of Education’s chief information officer said.
What I understand from what I’ve seen is that [DDoS attacks are] a commonality now … I think most organizations have to add to their tool suite a way to detect them.
Online attacks
GCN reports another edu DDoS attack. This one is on OnCourse Systems for Education a SaaS that provides software services to K-12 schools. The firm became the victim of UDP flood from Germany and the Netherlands. The firm tried to fly under the radar, Mark Yelcick, chief technology officer and partner at OnCourse said.
This was the first DDoS attack at OnCourse, and we never thought that we would be a target … There’s no money or assets to be gained by attacking an SaaS provider of K-12 educational systems. We felt that the firewall, intrusion protection and DDoS protection from our data center provider would be enough.
In order to turn back the tide of rouge packets, OnCourse brought in Prolexic. Prolexic has solutions tailored for the education market. The company engaged its emergency services, routing traffic through Prolexic’s 1.5 Tbps cloud-based DDoS mitigation platform and stopping the attacks. CTO Yelcick said, “We simply cannot afford downtime brought about by a DDoS attack.”
Because DDoS attacks can target any IP address, it’s impossible to completely prevent them, so for districts and the companies that offer data management services, the focus is on battling these attacks as they come.
“We have to be prepared and understand the environment that we are operating in so we’re prepared to address these issues as they come up,” says Infinite Campus CEO Eric Creighton, the victim of the Kentucky DDoS attack.
Attackers are after student PII
Part of predicting and combating cyber attacks is understanding why people order these attacks in the first place. When the target is a network that stores student grades and attendance information, the immediate thought is that a student is responsible. However, Mr. Creighton says that students rarely attempt attacks and, in his experience, have never succeeded.
“I don’t think these are attacks attempting to get data … There’s no jackpot of valuable data –there’s no payload here.” CEO Creighton may be spinning the results. rb- I wrote about schools collecting and losing PII here.
One reason that schools and districts are targeted is that their systems are designed for convenient access. Easy access for parents and teachers, makes for easier targets. Marcus Rogers, a professor, and chair of the cyber forensics program at Purdue University told Education Week.
For a lot of these attacks, the intended victim or goal is something bigger than the school. Obviously schools want to protect their data, but the bigger threat is when they use those networks now to go out and attack a power plant or a stock exchange or an air traffic control systems. That’s when the stakes go up.
Caused by a BYOD device
Kentucky education officials believe that the attack on their systems was triggered by a beacon. They hypothesize that a beacon was unknowingly placed on a student’s mobile device, which he or she took with them to school. Viruses can cause a device to send out a beacon, instructing thousands of other devices to attack the network the device is connected to. In Kentucky, officials say that this won’t stop individual districts from implementing bring-your-own-device programs. However, schools can decrease the chances of an attack by making sure that these student devices are properly protected according to Education Week. CIO Couch believes schools will start to protect themselves.
I think what you’re going to see is districts making sure that before people plug into their network they have up-to-date, good virus protection … I think you’ll start to see that in K-12.”
Purdue’s Rogers says that even when schools know best practices for avoiding and combating attacks, such measures are often cost-prohibitive. “A lot of times the schools know what to do, but at the end of the day if they’re trying to get library books, a firewall is not going to be their big concern.”
Related articles
- DDoS as a distraction: The one-two cyberpunch (pando.com)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
Alien Super Channels Set Record
Researchers have used alien technology to demo a broadband technology that can hit 1.4 terabits per second. That is enough to send 44 high-definition movies in just one second over the existing fiber network in London according to TechEye. A team from BT (BT) and Alcatel-Lucent (ALU) developed new infrastructure.
The BBC explained that the researchers used a new “flexigrid” infrastructure. Flexigrid created an “alien super channel.” The alien super channel was made of seven 200 Gbps channels, to vary the gaps between transmission channels. Increasing the channels’ density resulted in a 42.5% increase in the efficiency of data transmission compared with current networks.
Like adding more lanes of traffic
Kevin Drury, optical marketing leader at AlcaLu, told BBC news that the test was aimed at reducing space between lanes on a busy highway. He claims it is like adding more lanes of traffic to flow through the same path. He said that while wide lines can encompass heavy data transfers such as streaming video, narrow lanes would be assigned for low-data transfers such as standard web pages.
The test was conducted on a 255-mile (410km) fiber link between the BT Tower in central London and BT’s Adastral Park research center in Suffolk. BT thinks it could help it to meet consumer and business demand for increased bandwidth.
rb-
Unfortunately, the mega-speed BT’s aliens developed is all backbone and core network stuff. It will not change the speeds we the people will get at home.
Am I the only one that has noticed that none of the new broadband speed records do not happen in the U.S.? The power of monopoly.
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.


