Discover how mastering email communication can boost business efficiency, avoid common pitfalls, and ensure secure, respectful online interactions.
Turkey Revenge
The turkeys are pissed this Thanksgiving they are seeking revenge.
Germs Infest 60% of Americas Phones
60% of Americans sleep with their phones, harboring germs. Cleaning regularly with UV sanitizer or alcohol wipes can help keep your phone and bed germ-free.
Smartphone Sanitizing: A Practical Guide
Securely erase personal data from your old smartphone before recycling. Protect your identity from hackers—easy steps to follow.
Why Soft Skills Matter in Today’s Job Market
Boost your career with essential soft skills like communication, teamwork, and emotional intelligence. Learn why they’re crucial for workplace success.
UN Tries to Control the Internet Again
InfoSecurity reports that even after much of the free world refused to sign the controversial new ITU WCIT-12 treaty in December 2012, U.S. Many argued this would give the UN control of the Internet. Federal Communications Commission (FCC) Commissioner Robert M. McDowell warned, ‘the worst is yet to come.’
“The United States,” he said, “should immediately prepare for an even more treacherous ITU treaty negotiation that will take place in 2014 in Korea. Those talks could expand the ITU’s reach even further.” McDowell seems convinced that the ITU’s desire to control the internet is not a passing fancy, but a long-term intent. He may be right, and it may come before 2014.
Last week the ITU Secretary-General Hamadoun Touré released his draft report for the Fifth World Telecommunication/Information and Communication Technology Policy Forum 2013. “This draft report of the Secretary-General to the WTPF-2013,” it states, “aims to provide a basis for discussion at the Policy Forum, incorporating the contributions of ITU Member States and Sector Members, and serving as the sole working document of the Forum focusing on key issues on which it would be desirable to reach conclusions.”
Suggested themes for discussion include, “Global Principles for the governance and use of the Internet,” and “On the basis of reciprocity, to explore ways for greater collaboration and coördination between ITU and relevant organizations – including, but not limited to, the Internet Corporation for Assigned Names and Numbers (ICANN), the Regional Internet Registries (RIRs), the Internet Engineering Task Force (IETF), the Internet Society (ISOC) and the World Wide Web Consortium (W3C) – involved in the development of IP-based networks and the future internet, through cooperation agreements, as appropriate, to increase the role of ITU in Internet governance to ensure the largest benefits to the global community.”
This is exactly what caused disarray in December’s WCIT in Dubai the commissioner states.
Meanwhile, a ‘de-fund the ITU petition has appeared on the White House ‘We the People’ website. A supporting website gives full details. “Fighting on behalf of the Internet,” it states, The United States government and fifty-four other countries rejected the ITU’s takeover attempt, but this is a single battle in a war that the ITU will continue to fight. The ITU is spending more than $180M/year to oppose the Internet and is drawing from its reserves more heavily each year ($9M in 2010, up from $5.5M in 2009), as progressive countries withdraw their payments from the ITU’s war-chest.
The ten most oppressive countries in the Open Net Initiative’s ranking of online freedom all sided against the internet, and none of them are giving the ITU as much as the U.S. is. If all the countries that stood with the Internet against the ITU’s attack withdraw their funding, it claims, “the ITU’s membership revenue will be reduced by 74%.”
The petition also calls for future U.S. delegations to be reduced “to no more than one USG representative, tasked primarily with communicating a U.S. position that the ITU’s only legitimate area of authority is radio communications.” The long-term danger from such entrenched views on both sides is that the worldwide nature of the internet might fracture into one internet under multi-stakeholder governance in the ‘free’ world, and a series of heavily government-regulated Internets elsewhere.
“Freedom and prosperity are at stake,” warned Commissioner McDowell.
rb-
I have warned about the United Nations’ attempt to take over the Internet since November.
Related article
- RT: UN launches new attempt to control the Internet (jhaines6.wordpress.com)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
Internet of Things Infographic
Bosch Software Innovations released some new data on the Internet of Things (IoT) In the near future, more and more devices and systems will be capable of sending and receiving data automatically via the internet. We’re already poised on the verge of new developments that offer enormous market potential. Bosch believes the Internet of Things isn’t just a distant vision of the future, it’s already very real and is having an impact on more than just technological developments.
The blog claims that in the next few years, increasing numbers of devices and systems will automatically send and receive data over the Internet. The author claims that we are about to see a huge new market develop.
By 2015, Bosch predicts that the number of IP-ready devices connected to the Internet will grow to a total of 6,593 billion. Even more impressive according to the author, is the growth in Internet access. The blog reports that in 1995, less than 1% of the world’s population was online, in 2011 this number exploded to 2.3 billion people online, Bosch expects that in 2015, 5.5 billion people will have internet access (source: ITU). This equates to around 75% of the world’s population.
The German firm estimates the number of devices configured to send and receive data over the Internet will reach 50 billion devices in 2020. Just recently, Vint Cerf, who is better known as the father of the internet, also spoke in an interview about the number of devices and confirms this assumption.
Related articles
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
Acer Halts eMachines
Taiwanese PC maker Acer confirmed to ChinaTechNews.com that the company has terminated the operations of its eMachines brand, which was gained during the company’s 2007 $710 million acquisition of Gateway. Gateway acquired eMachines in 2004 for $30 million, and Packard Bell in 2007.
The termination of the operation of the eMachines brand is in line with the streamlining policy announced at the end of 2011 by J.T. Wang, chairman of Acer (ACEIY) The company will continue to carry out brand integration and the entire process is expected to be completed in three years. Reportedly, Acer will continue to invest in post-PC Gateway and Packard Bell products to sell “a variety of devices that would have been thought of as beyond the PC in the past,” Lisa Emard, an Acer spokeswoman, said in an email to PCWorld.
Acer was the fourth-largest PC vendor behind HP (HPQ), Lenovo (LNVGY) and Dell (DELL). They have shipped around 7 million units, in FY 2012, a drop of 28.2% compared year over year reports PCWorld.
rb-
eMachines, the ultimate throw-away machine, has fallen victim to the iPad. I had an eMachines for a while at the turn of the century, and yes it survived Y2K. Do you think it matters that Acer stopped selling eMachines?
Related articles
- Acer Sees More Success in Chrome OS Than in Windows 8 (tomshardware.com)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
Are Users the Future of CyberSecurity?
Gartner is shopping the idea that the people using IT systems and corporate data are perhaps the best ones to guard them. They are calling the People Centric Security (PCS). According to a ZDNet article, People Centric Security loosens IT controls and relies on end-users to assume responsibilities for protecting IT systems and data.
Tom Scholtz at Gartner (IT) presented the idea at the recent Gartner Identity and Access Management conference. They explained it this way, empower users with responsibility for systems and data important to their work, sprinkle in consequences for breaching that responsibility, and users will do the right things to secure their environment.
Gartner argues that the convergence of social, mobile, cloud and big data are eroding corporate boundaries and controls in many areas long thought to be state-of-the-art defenses. “The current approach in developing policies and controls doesn’t scale to current realities,” Mr. Schotlz said.
Mr. Scholtz argues current information security policies and tools grind on productivity. He says the relationship between IT, the business, and workers has transformed and necessitates a change in regard to information security. “In this brave new world, what we do as security people is viewed as negative. We are the people who slow things down.”
However, Gartner is not advocating losing all controls and policies only loosening them. Mr. Schotlz argues that taking away controls on data and replacing them with new user-based responsibilities, principles, and rights may just improve end-user focus and produce a more managed and secure environment. “We cannot forget about the bad guys outside our enterprise; we do not get rid of all our defenses,” he said.
“One of the realities in the current approach to information security is we treat the 95% of people that want to do the right thing, we treat them like the bad people in order to protect against the bad things done by the 5% of people who have bad intentions,” said Scholtz. “We treat them like children, and if you treat people like children, they will act like children.”
The PCS goal is to implement a “trust space.” ZDNet explains that concepts surrounding “mutual trust” are not new, they have been used in traffic planning, Europe’s Schengen Agreement, open source, and even cloud computing, where companies trust that large providers will protect their data as part and parcel of protecting their own valuable brands.
Such an environment “makes it easier to monitor for exceptions, the good people are not trying to circumvent the controls,” says Scholtz.
Gartner’s Scholtz knows PCS is not for everyone and that implementation requires cultural and educational challenges. “Maybe we could develop a situation where we have a set of underlying principles that underpin how people use data and how they access systems, and we link those with specific individual responsibilities,” he said. “Maybe we get a more collaborative and social environment.”
There are specific requirements if PCS is to prosper according to the article, the process has to be top-down and there have to be effective punishments for those that abuse their rights. Scholtz admits his concepts are in the embryonic stage, but that they will evolve in the coming months as he works with select enterprises. He noted that a European bank and a U.S.-based agricultural business are already adopting PCS concepts.
rb-
How crazy do you think the PCS concept is? Can it work? Remember that just a couple of years ago, Gartner called BYOD, which I covered here in 2010.
Are your users the future of cybersecurity?
Related articles
- Employees put critical infrastructure security at risk (networkworld.com)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.





