Featured Posts

<< >>

Master Email for Business Efficiency

Discover how mastering email communication can boost business efficiency, avoid common pitfalls, and ensure secure, respectful online interactions.

Turkey Revenge

The turkeys are pissed this Thanksgiving they are seeking revenge.

Germs Infest 60% of Americas Phones

60% of Americans sleep with their phones, harboring germs. Cleaning regularly with UV sanitizer or alcohol wipes can help keep your phone and bed germ-free.

Smartphone Sanitizing: A Practical Guide

Securely erase personal data from your old smartphone before recycling. Protect your identity from hackers—easy steps to follow.

Why Soft Skills Matter in Today’s Job Market

Boost your career with essential soft skills like communication, teamwork, and emotional intelligence. Learn why they’re crucial for workplace success.

Farewell Steve Tour

Farewell Steve Tour MicrosoftThe Bach Seat Steve Ballmer farewell tour continues as rumors swirl about Ford (F) CEO Alan Mulally taking over at Microsoft. Or will Bill Gates returning ala Steve Jobs to save Redmond. Whatever the grand poobah’s at MSFT are thinking. They will probably never find another CEO like Steve.

Here is newly minted CEO Ballmer opening up the company’s 25th Anniversary in September 2000, doing what he calls a “monkey dance” and shouting “give it up for me!” When he finally calms down, barely able to speak between gasps of air, he manages to shout four words: “I .. Love … This … Company!

 

Related articles
  • Microsoft Corporation (MSFT): Will Bill Gates Return As CEO? (valuewalk.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Whats a Petabit Network

Whats a Petabit NetworkSeems like it was a couple of months ago, we were excited about fiber optic cable that twisted light to carry data at 1.6 Tbps per strand. Now a Petabit network is the new benchmark. U.K. and Japanese researchers mashed up software-defined networking (SDN) and multicore fiber to produce the first Petabit pipe according to Kevin Fitchard at GigaOM. A Petabit is one quadrillion (1,000,000,000,000,000 or 1015) bytes binary digits or one thousand Terabits.

Petabit network uses multicore fibers

Whats a Petabit NetworkThe researchers mashed up multicore fibers and SDN to makes very high-speed networks programmable. GigaOM speculates this will allow carriers to adjust the network capacity and latency to meet the needs of traffic traveling over their networks. First, GigaOM explains that the fiber is unlike today’s single strands of glass, or cores, that carry a single beam of light down the fiber. Multicore fiber is exactly what its name implies: multiple cores each carrying a single core’s worth of capacity over the same link. Professor Dimitra Simeonidou at the University of Bristol called current single-core fiber a capacity bottleneck.

Space Division Multiplexed

The multicore group, led by NICT and NTT in Japan which built a 450 km (280 miles) section of fiber optics using 12 cores in two rings capable of transmitting 409 Tbps in either direction. That’s 818 Tbps in total. Which is within spitting distance of seemingly mythical Petabit speeds according to GigaOM. The MCF research relies on Space Division Multiplexed (SDM) provided by the multicore fibers.

ResearcherIn order to control the massive bandwidth, a team from the High Performance Networks Group at the University of Bristol created an OpenFlow software-based control element to manage those enormous capacities. The Brits implemented an interface that dynamically configures the network nodes so that it can more effectively deal with application-specific traffic requirements such as bandwidth and Quality of Transport.

According to the researchers, this was the first time SDN was used on a multicore network. The University of Bristol presser announcing the new technology says this technology will overcome critical capacity barriers, which threaten the evolution of the Internet.

rb-

OK, so that really – really – really fast. We also know from a 2011 New Scientist article that the total capacity of one of the world’s busiest routes, between New York and Washington DC, is only a few Terabits per second. With bandwidth-hungry applications like cloud computing, social media, and video-streaming continuously growing it forces network planners at firms like AT&T (T), Verizon (VZ), and the NSA to find new ways to grow their capacity.

Data center

Comcast (CMCSA) just finished a 1 Tbps network field trial on a production network between Ashburn, VA, and Charlotte, NC. Most likely the first place Pbps networking will be used is in the mega-data centers of the likes of Google (GOOG), Facebook (FB), or Microsoft (MSFT).

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

More Tech Trouble at School

More Tech Trouble at SchoolIt’s not a good time for tech in schools. The security woes at school are not limited to the iPad debacle at LAUSD. (rb- You can see my coverage here – Updates since the first article – LAUSD started confiscating the iPads and delayed the district-wide roll out one year until 2015.) GigaOM’s Ki Mae Heussner writes that Guilford County Schools in North Carolina has suspended its tablet program with Rupert Murdoch’s News Corp’s Amplify after reports of faulty equipment.

NC school district suspends tablet program

uspended its tablet programThe district reportedly spent $16.4 million ($299 / device + a 2-year subscription at $99 per year) of a $30 million Race to the Top grant to pay for the tablets and content. The device is a 10-inch ASUS (2357) tablet running the Google (GOOG) Jellybean Android operating system. It comes pre-loaded with content and apps curated by Amplify. It enables teachers to distribute content across a class or grade level and control the content on students’ screens.

GigaOM cites the school district’s website, which says they have sent 10% of their 15,000 devices back to Amplify because of broken screens. About 2,000 cases have also been problematic. In one instance, a student returned a defective charger, reporting that overheating caused the plastic to melt. While the district said it expected a few glitches with the rollout, school officials decided to pause the program for safety’s sake. GigaOM claims the pause is a big setback for Amplify, which launched its education-optimized tablet at hipster South by Southwest earlier this year.

NewsCorpSince its launch, skeptics have wondered how schools would respond to the privacy questions and the prospect of doing business with Amplify’s parent company News Corp. (given its phone-hacking scandal). Ms. Heussner speculates that the suspension could give schools more reason for pause when it comes to embracing the new technology.

Asus told GigaOM that out of 500,000 chargers of its kind that they have shipped globally, only the one in Guilford overheated and melted. Justin Hamilton, Amplify’s SVP of corporate communications seems to be blaming the customer. He claimed the broken screen rate in Guilford is higher than in other school districts. “We’re working very closely with the district on this and hope to have things resolved and the program back up and running very soon,” Mr. Hamilton said.

Indiana mobile security fail

circumvented the security on district-issued Apple iPadsIn Indiana, Education Week reports that between 300 and 400 students in the Center Grove school district circumvented the security devices on district-issued Apple (AAPL) iPads within hours of receiving the devices according to a report last week in the Daily Journal.

Apparently, students found ways to reprogram the iPads so they could download games and apps for social media sites, according to the report. Center Grove officials attributed the problem to their security program not being able to handle the 2,000+ devices they distributed.

spread like wildfireKeith Krueger, the CEO for the Consortium for School Networking, said such problems are increasingly common as districts deploy an increasing number of devices. “Kids and adults find ways to hack through things, and it can spread like wildfire,” he said. “It’s frustrating, and it’s a huge challenge for any district.

Data center failures

In addition to the tablet troubles, Data Center Knowledge’s Rich Miller reports several school data center failures. According to DCK, two public school systems suffered data center failures that crippled their IT systems.

data center fire suppression systemIn Oregon, the Beaverton School District experienced several days of disruption after an errant alarm set off its data center fire suppression system. The fire suppression system damaged hard drives and servers. That left Beaverton schools unable to use email or access class lists, student schedules, and online textbooks. “It knocked all of the systems in the data center off-line,” said Steve Langford, chief technology officer. “All of the systems that staff needs to do their jobs.” District IT staff worked over the Labor Day weekend to replace the damaged systems.

In California, the Davis Unified School District started school without key IT services after the district’s servers overheated. DCK reports an air conditioner unit failed, allowing the temperature in the server room to rise to 120 degrees F. “There’s an incredible impact on everyone in the whole organization,” says the district’s Kim Wallace. “Students can’t access computers. Teachers can’t take attendance. Parents can’t email. We can’t email out.” The DCK article said staff were still troubleshooting damaged equipment and lost data.

rb-

The best strategy, COSN’s Krueger said, is to combine the best possible security filters and other technical measures with a comprehensive responsible or acceptable use policy that students and families must sign and a commitment to enforcement. “It’s not surprising that a school district would have some breaches,” he said. “The question is how do you leverage it into a teachable moment?”

Who needs the teachable moment? Sure the kids need to understand there are real consequences for their actions but, can the politicians administrators be taught to be serious about IT? Seems to me that most of these failures are management failures. It is probable that these failures could have been reduced with proper project management.

proper project managementIt is my experience that many administrators do not recognize project management professionals. It appears they would stick with the good ole boy network and hire their less qualified friends or the professional BSer’s.

Now about project management? Modern backup system? Disaster Recovery plan?  BCP?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

A Close Look at 802.11ac Wi-Fi

TA Close Look at 802.11ac Wi-Fiech pundits argue that the new Wi-Fi standard 802.11ac will replace wired gigabit Ethernet networking. 802.11ac is a supercharged version of 802.11n, offering link speeds ranging from 433 Mbps, up to multiple gigabits per second.

Wi-FiTo make 802.11ac dozens of times faster than 802.11n, the new standard works exclusively in the 5GHz band uses a huge chunk of bandwidth (80 or 160MHz), operates in up to eight spatial streams (MIMO), and a technology called beamforming.

At its core, 802.11ac is essentially an updated version of 802.11n, according to Sebastian Anthony the author of an ExtremeTech article “What is 802.11ac WiFi, and how much faster than 802.11n is it?” 802.11n was a huge performance increase over 802.11a and g. 802.11n introduced some key technologies that brought massive speed boosts. Where 802.11n had support for four spatial streams (4×4 MIMO) and a channel width of 40MHz, 802.11ac can use eight spatial streams and has channels up to 80MHz wide, which can be combined to make 160MHz channels. This means that 802.11ac has 8 x 160MHz of spectral bandwidth to play with, versus 4 x 40MHz – a huge difference that allows 802.11ac to send vast amounts of data across the airwaves.

Beamforming

What is new in Wi-Fi

802.11ac also introduces 256-QAM modulation (up from 64-QAM in 802.11n), which sends 256 different signals over the same frequency by shifting each signal to a slightly different phase. In theory, this quadruples the spectral efficiency of 802.11ac over 802.11n. Spectral efficiency is a measure of how well a given wireless protocol/modulation/multiplexing technique uses the bandwidth available to it.

802.11ac also introduces standardized beamforming Matthew Gast, Director of Product Management at AeroHive Networks published an article, “Investing in Beamforming: Is it worth it?” that explains beamforming.

Aerohive logoRather than transmitting a radio signal in all directions, beamforming figures out where the receiver is, and focus the energy towards the receiver. Instead of spraying radio energy all over the place, send packets as a “rifle shot” directly to the receiver’s antenna Mr.Gast explains.

Beamforming is a two-step process: First, figure out how to “aim” the transmission at the receiver, and second, send the transmission. With beamforming, a transmitter is betting that by paying the cost of the channel measurement process, the data transmission that follows will speed up enough to pay off the cost.

802.11n Beamforming was non-standardized, in 802.11ac, there is only one method of beamforming, called the Null Data Packet (NDP). (rb- Read the AeroHive article for a full description of NDP)

Aerohive’s Gast concludes that by steering the energy towards a receiver, beamforming enables you to take a step up to a higher data rate. Mr. Gast estimates that 802.11-based beamforming gives you a 3-5 dB gain.

802.11ac is speedyIn theory, at the 5GHz band with beamforming, 802.11ac should have the same or better range than 802.11n  However, Mr. Anthony says the 5GHz band, has less penetration power so it doesn’t have the same range as 2.4GHz (802.11b/g). The ExtremeTech article concludes that’s an acceptable trade-off: there simply isn’t enough spectral bandwidth in the cluttered 2.4GHz band to allow for 802.11ac’s gigabit-level speeds.

ExtremeTech‘s Anthony calculates there are two answers to how fast is Wi-Fi 802.11ac, the theoretical max speed, and the practical max speed that mere mortals will get surrounded by lots of signal-attenuating obstacles.

He calculates the theoretical max speed of 802.11ac is eight 160MHz 256-QAM channels, each of which is capable of 866.7Mbps – a grand total of 6,933Mbps, or just shy of 7Gbps. That’s a transfer rate of 900 megabytes per second. Compare this with 802.11n’s max theoretical speed, which was 600Mbps. He then says in practice, the current max speed of 802.11ac devices is 1.7Gbps.

ExtremeTech points out there will be a second wave of 802.11ac devices – due in 2014 after the standard is finalized – before 160MHz channels and multi-gigabit speeds become a reality. The max speed over an 80MHz channel is 433.3Mbps, and there aren’t any 802.11ac chipsets that support up to eight streams.

Broadcom logoKevin Fitchard at GigaOM reports that recently the Wi-Fi Alliance kicked off its 802.11ac certification program. First to get the official Wi-Fi stamp of approval was the Samsung Mega 6.3, followed by two other Samsung models.

As with the 802.11n certification process, the Wi-Fi equipment makers are moving faster than the standards bodies. The IEEE is actually still putting the finishing touches on the 802.11ac standard, which is not due until 2014.

Wi-Fi certifiedThe Wi-Fi Alliance expects the first batch of ac devices will support speeds of 433 Mbps and progress into more advanced levels of the standard. The Alliance has pre-certified systems from companies like Broadcom (BRCM), Qualcomm (QCOM), Realtek, and Marvell (MRVL). Cisco (CSCO) was one of the first vendors to get an access point certified.

“AC is going into mobile and portable devices first…,” Wi-Fi Alliance Marketing and Program Management Director Kelly Davis-Felner said. ABI Research estimates that 40 percent of all ac devices shipped in 2013 will be handsets.

rb-

Wi-Fi will replace wired Ethernet networkingWhile tech pundits argue that the new 802.11ac Wi-Fi will replace wired gigabit Ethernet networking at home and in the office. While the consumerization of IT and BYOD are strong forces, the life-cycle of cabling infrastructure is 25 years, a cost not lightly abandoned in the walls. it is more likely to happen at home first. Who wants all the crappy wires running all over the house?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Need Cyber Insurance?

Need Cyber Insurance?Standard business insurance does not cover data breaches or almost any other loss involving data. Standard insurance covers tangible losses and damage. Data isn’t tangible says Network World. The ruling that data is not tangible goes back to a 2000 ruling by a U.S. District Court. The article explains the ruling arose from an Arizona case, American Guarantee & Liability Insurance Co. vs. Ingram Micro Inc.. In that case, the court said that a computer outage caused by a power problem constituted physical damage within the meaning of the policy Ingram Micro had purchased from American Guarantee.

Courts ruled data is tangible propertyAfter that, the insurance firms changed their policies to state that data is not considered tangible property,Kevin Kalinich, national managing director for network risk at Aon Risk Solutions told Network World. The upshot is that an enterprise needs special cyber insurance to cover data-related issues. The problem is that the field is new and there is no such thing as standard coverage with a standard price.

Larry Ponemon, chairman of the Ponemon Institute, told Network World that the resulting complexity is a major source of push-back by potential buyers. “The policies have limitations and constraints similar to home policies with act-of-God provisions, and that has created a lot of uncertainty about what is covered, and what the risks are.” Mr. Ponemon told the author, “Those who are nevertheless purchasing cyber insurance are typically very selective about what coverage they want.”

Network World describes the types of cyber coverage available.

cyber coverages availableData breach coverage: This pays for expenses that result from a data breach. Covered expenses typically include notification of the victims, setting up a call center, credit monitoring, and credit restoration services for the victims, and other crisis management services, Ken Goldstein, vice president at the Chubb Group, told Network World. “You might want to hire forensic experts, independent attorneys for guidance concerning the multiple state (data breach notification) laws, and public relations experts.”

Regulatory civil action coverage: Pays in cases where the insured is facing fines from a state attorney general after a data breach, or from the federal government after a violation of the Health Insurance Portability and Accountability Act (HIPAA) or similar regulations. Some policies only cover the cost of defending against the action, while others may pay the fine as well, says Steven Haase, head of INSUREtrust, an Atlanta-based specialty insurance provider.

Cyber extortion coverageCyber extortion coverage: For cases where a hacker steals data from the policyholder and then tries to sell it back, or someone plants a logic bomb in the policy holder’s system and demands payment to disable it. Among other things, the policy should cover the cost of a negotiator, and the cost of offering a reward leading to the arrest of the perpetrator, Chubb’s Goldstein says.

Virus liability: Pays in cases where the policyholder is sued by someone who claims to have gotten a virus from the policy holder’s system.

Chubb logoContent liability: Covers lawsuits filed by people angered over something posted on the Web site of the policyholder. Such coverage should also cover copyright claims and domain name disputes, INSUREtrust’s Haase told Network World.

Lost income coverage: Replaces revenue lost while the policy holder’s computer system or Web site is down. But Aon’s Kalinich notes that insurers often apply minimum downtimes of 12 or 24 hours, or require proof of actual losses, “They’ll say that, after all, the customers who did not get through (during the outage) could have come back later.”

AON logoLoss of data coverage: Pays for the cost of replacing the policy holder’s data in case of loss, “Backup policies are not always effective, and accidents and sabotage happen,” Mr. Haase says.

Errors and omissions coverage: Otherwise known as O&M policies, this type of coverage predates cyber insurance, but is increasingly added to cyber policies to cover alleged failures by the policy holder’s software, Haase says.

Errors and omissions coverageAs for what coverage costs, Aon’s Kalinich told Network World that firms smaller than $100 million in annual revenue can expect to pay $5,000 to $15,000 per million of coverage, while larger firms would pay $10,000 to $25,000. For those over a billion, the price can be in the $20,000 to $50,000 range. Robert Parisi, senior vice president with Marsh, an insurance broker, and risk advisory firm put it simpler, saying the cost is between $7,000 and $35,000 per million. Of course, the lower ranges are for buyers who look like better risks — and deciding who is a better risk is another factor that makes cyber insurance a complex topic.

You cannot get good insurance unless you have good security practices,” VP Kalinich says. “Due diligence underwriting has become more streamlined as the insurers have learned what to look for. They will typically benchmark you against other members of your industry.

15% of the premium goes to commissionsINSUREtrust’s Haase explained the cyber insurance purchase process to the author, “This is a complex purchase and you need a professional helping you. Most policies are highly customizable, and there are a lot of endorsements.” Typically the buyer goes to their local agent, and the local agent uses a specialist, Haase says. Both the local agent and the specialist get commissions ranging from 7.5% to 10% so that 15% to 10% of the premium goes to commissions.

Finally, Toby Merrill, vice president of insurer Ace Professional Risk cautions that cyber insurance buyers must understand that if they are outsourcing their data handling, they are not at the same time outsourcing their liability if there is a data breach. The onus of the various breach notification laws is on the organization that gathered the data, not on the organization that was storing it when it was exposed, he notes.

Cyber insurance is not there to replace sound risk management,” VP Merrill told Network World, “It is there to supplement it.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.