Featured Posts

<< >>

Master Email for Business Efficiency

Discover how mastering email communication can boost business efficiency, avoid common pitfalls, and ensure secure, respectful online interactions.

Turkey Revenge

The turkeys are pissed this Thanksgiving they are seeking revenge.

Germs Infest 60% of Americas Phones

60% of Americans sleep with their phones, harboring germs. Cleaning regularly with UV sanitizer or alcohol wipes can help keep your phone and bed germ-free.

Smartphone Sanitizing: A Practical Guide

Securely erase personal data from your old smartphone before recycling. Protect your identity from hackers—easy steps to follow.

Why Soft Skills Matter in Today’s Job Market

Boost your career with essential soft skills like communication, teamwork, and emotional intelligence. Learn why they’re crucial for workplace success.

FCC Clears Internet Access by Power Lines

FCC Clears Internet Access by Power LinesF.C.C. Clears Internet Access by Power Lines, NY Times, Stephen Labaton

WASHINGTON, Oct. 14 – Clearing the way for homes and businesses to receive high-speed Internet services through their electrical outlets, the Federal Communications Commission adopted rules on Thursday that would enable the utility companies to offer an alternative to the broadband communications services now provided by cable and phone companies.

As a further spur to the roll-out of broadband Internet services, the F.C.C. also ruled that the regional Bell companies do not have to give competitors access to fiber optic lines that reach into consumers’ home – a decision that prompted two of the Bells, SBC Communications and BellSouth, to announce that they would move quickly to build new fiber optic networks in residential neighborhoods. The ruling was criticized by rivals of the Bells and consumer groups, which called it anti-competitive and said it would lead to higher prices.

For the electric companies’ part, broadband Internet service is more than a year away from becoming widely available. But the agency’s ruling is expected to increase significantly the level of investment and interest by the utilities, which had been stymied in previous attempts to offer new services over power lines. Power lines reach more American homes than either telephone lines or television cables.

So far, the technology has been limited mainly to experiments around the country, although a commercial version recently became available in some communities near Cincinnati.

“Today is a banner day, and I think years from now we will look back and see it as a historical day for us,” said Michael K. Powell, the F.C.C.chair. “This is groundbreaking stuff.”

Known as broadband over power lines, or B.P.L., the technology uses a special modem that plugs into electrical outlets. So far, it has been offered at speeds of 1 to 3 megabits a second, which is comparable to broadband service over cable modems or conventional phone lines – though not as fast as the 5 megabits a second achievable through the residential fiber-optic lines just now being introduced by the Bell companies.

An obstacle to the use of power lines to carry communications traffic has been the electromagnetic interference the technology can cause to various types of radio signals. The commission ruled that it would tolerate a small amount of radio interference in certain areas by the new service in exchange for making the broadband market more competitive.

Amateur radio operators and public safety officials had asked the commission to move slowly in the area because of the interference created by the service. The agency responded by setting up a system to monitor interference and restricting the service in areas where it could jeopardize public safety, like areas around airports and near Coast Guard stations.

Officials noted that there have already been field tests in 18 states of the B.P.L. technology. One company, Current Communications, has recently begun to offer broadband service near Cincinnati in a joint venture with Cinergy, the Midwest power and energy company. The service is priced at $29.95 to $49.95 a month, depending on the speed.

While some regulatory and technical issues remain, the technology offers enormous promise because the power grid is ubiquitous. The costs to the industry to offer the new service would be comparatively small, and the possible returns on those investments could be high. If the utility companies do begin to offer the broadband service more widely, they would also be likely to enter the telephone business by offering phone services over the Internet, just as phone and cable companies have begun to do.

Mr. Powell, the F.C.C. chair, said that the new technology would not only offer greater competition in the broadband market but would also allow consumers to easily create networks in their homes through electrical outlets. And adding communications abilities to power lines would permit electric companies to better manage the power grid, he said.

Mr. Powell and three other commissioners voted to approve the rules. The fifth commissioner, Michael J. Copps, dissented in part. He noted that the agency had pushed aside a number of vital issues for another day, including questions of whether utility companies would have to contribute to the telephone industry’s universal service fund and provide access to people with disabilities, and whether measures would be put in place to ensure market competition.

He also said that regulators would need to determine whether it would be fair for electricity customers to pay higher bills “to subsidize an electric company’s foray into broadband.”

“We just have to get to the big picture and confront the challenges I have mentioned if B.P.L. is going to have a shot at realizing its full potential,” Mr. Copps said.

But industry executives praised the decision.

“This is one of the defining moments for the widespread adoption of broadband by Americans,” said William Berkman, chairman of Current Communications, a private company in Germantown, MD, which hopes to have in place a B.P.L. Internet network passing by 50,000 homes by the end of the year. The future also grew brighter for the regional Bell companies with the F.C.C.’s decision to grant BellSouth’s request to exempt the Bells from any requirement that they lease their new fiber lines to the home to rivals at low costs.

Mr. Powell said that the exemption would “restore the marketplace incentives of carriers to invest in new networks.”

Prompted by the decision, the Bells said they would move more rapidly to build fiber networks to homes. So far, the nation’s biggest Bell, Verizon Communications, has been the most active in building residential fiber networks. But on Thursday, SBC said it now planned to provide 18 million households higher speed Internet services in two to three years, rather than five years as previously announced.

“The shovel is in the ground, and we are ready to go,” said SBC’s chairman and chief executive, Edward E. Whitacre Jr.

But rivals, consumer groups, and Mr. Copps criticized the decision as anti-competitive.

The F.C.C. majority seems unable to restrain its preference for monopoly over America’s consumers, business users, and investment, said Len Cali, a vice president for AT&T.

Mark Cooper, director of research at the Consumer Federation of America, said the decision would tighten the already powerful grip that the telephone and cable companies have on broadband services.

“This stranglehold will stifle innovation as these duopolies discriminate against unaffiliated applications and services that in the past have driven the growth of the Internet and the boom in information technology,” Mr.Cooper said.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Broadband’s Power-Line Push

Broadband's Power-Line PushFrom TechRepublic – People have experimented with building communication networks over power lines since the 1950s. But the broadband over powerline (BPL) technology has never seriously caught on due to its low speed, low functionality, and high development cost.

In recent years, new modulation techniques supported by other technological advances have helped BPL evolve. Most services today are capable of delivering between 512 Kbps and 3 Mbps of throughput, which is comparable to most DSL offerings.

But policy disputes and expensive failures largely have been the hallmark of BPL. In 1999, for example, Nortel Networks, a telecommunications equipment maker, and the British energy company United Utilities abandoned a two-year BPL project.

Because BPL uses the radio frequency signals sent over medium and low-voltage AC power lines to connect customers to the Internet, it can cause interference with HAM radios and emergency radios. Power lines, it seems, are great and often overpowering antennas because of their length and height off the ground.

In 2004, the FCC released a set of rules governing the use of BPL to prevent interference. Most BPL equipment deployed today keeps to these limits. “I think the issue of interference has been a little overblown,” said Bob Gerardi, manager of power line communications for Duke Power, based in Charlotte, N.C. “Some of the first-generation equipment had some problems, but the latest technology adjusts the power levels to avoid any interference.”

With many of the technical issues ironed out, BPL is slowly getting deployed. More than 50 utilities across the country are looking into it. Duke Power, along with Progress Energy in Raleigh, N.C, and Consolidated Edison in New York, is one of three power companies in trials with EarthLink.

Duke began its trial with 500 homes and plans to launch a commercial service to 10,000 to 15,000 homes by the end of this year, said Gerardi. The company, which will rent access to its network to ISPs such as EarthLink, said it will be able to handle high-speed data services at 512 Kbps to 5 Mbps, along with voice-over IP services. The cost of the service will likely be about $30 a month. “The feedback we have gotten from customers is that they want choice,” said Gerardi. “They are happy that Duke Power is pursuing this technology, and we feel an obligation to our customers to vet the opportunity because of the potential benefits.”

But some analysts say it will be difficult for BPL to make any significant gains against the cable and phone companies, which have a big lead both in terms of subscribers and mind share. Jim Penhune, an analyst with Strategy Analytics said, “The big problem for power companies is not the technology, but the timing … The more mature the market, the harder it is for new entrants to break in.”

The power companies are also not in a great position to bundle their services. Cable operators and phone companies are going after the “triple play” market, which includes a package of telephony, television, and high-speed data services. While it’s not inconceivable that power companies will try to bundle other services with their broadband access, critics say it’ll be a stretch.

“Power companies make the Bells look like fast-paced innovators when it comes to launching into new businesses,” said Penhune. “I don’t see them as particularly nimble.”

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Google Invests in BPL Internet

Google Invests in BPL InternetGoogle, Goldman, and Hearst invest in broadband over powerline (BPL) Internet company Current Communications Group. The firm provides Web access over electrical power lines and said it would use the financing to accelerate its deployment of voice, video, and data services in domestic and global markets. The company declined to disclose the financial terms of the investment, though the Wall Street Journal reported that it approached $100 million.

Current’s service is available primarily in Cincinnati, Ohio, through a partnership with Cinergy Corporation with smaller deployments in Maryland and Hawaii.

Is BPL ready to grow

Google logo

“Clearly the technology is ready to be pushed into new markets and we are spending a great deal of our time trying to do that,” said Scott Bruce, managing director of Current and its major backer, Liberty Associated Partners. “It’s already commercial and ready for prime time.”

The technology has not gained significant traction yet among consumers, though, as it is not widely offered. But Bruce said Google’s investment in Germantown, Maryland-based Current fit right in with the Internet search giant’s philosophy of spreading Internet access.

“Our attraction for having a relationship with Google is sort of obvious. They’re interested in the proliferation of broadband generally,” he said.

Google said in a statement it was “very excited to have a relationship with Current Communications Group to help promote better access to the Internet.” The company already has a number of deals with broadband providers for various content and search services, Comcast among them.

A top Hearst executive said the investment fit in with the media company’s distribution strategy. “We have an interest in delivering our content through the widest possible pipes,” said Ken Bronfin, president of interactive media for Hearst. “The idea of creating another delivery mechanism to the home, especially in under-served areas, is attractive.”

A spokesman for Goldman, Sachs, and Co. confirmed the investment but declined further comment.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

The Secret Life of Copiers

The Secret Life of Copiers-Updated – 05-11-2007- Most digital copiers manufactured in the past five years have disk drives to reproduce documents. As a result, the seemingly harmless machines that are commonly used to spit out copies of sensitive information can retain the data being scanned.

Digital copier manufacturer Sharp issued a warning about photocopier vulnerabilities in conjunction with tax season. The company warned that it isn’t just people who make copies of their tax returns who are at risk.

A few years ago Sharp was among the first to offer a security kit for its machines. The security kit would encrypt and overwrite the images being scanned. Overwriting the data ensures it isn’t stored on the hard disks indefinitely.

In many cases, a central administrative or IT department monitors an entire fleet of copiers using each machine’s Internet Protocol (IP) address. What they forget is that, because the copiers are managed remotely, other people could get access to them. Firms can take action in several ways.

One option is to close IP ports. When a copier is being installed, the IT staff should close IP ports to ensure there is only one access point to the machine. Another option would be to use media access control (MAC) filtering. MAC filtering sets rules to accept commands only from specified MAC addresses such as the help desk, restricting outsiders.

The Secret Life of Copiers, CFO Magazine May 01, 2004

Last fall, reports began circulating that a large university in the Northeast had uncovered an illegal music-file-swapping service on campus. The music files were stored in a spot nobody would ever think to look: a copy machine. The students were actually transferring MP3s to and from a hard drive on a copier, The machine’s hard drive was designed to capture and store scanned documents. Apparently, a member of the school’s IT department stumbled on the plot after noticing a remarkable amount of traffic going to and from the networked copier.

While the technology for making copies has changed little in the past 50 years, most copiers are now full-blown IT devices, with network and E-mail server connectivity. employees typically have unfettered access to copiers — and thus any information stored on them. This makes copy machines perfect targets for hackers or, since the drives are usually removable, thieves.

Enterprise appliance security could prove to be of real importance in the new era of privacy (for example, the Health Insurance Portability and Accountability Act of 1996, or HIPAA) and document management (the Sarbanes-Oxley Act of 2002). That’s doubly true if a company uses copiers to scan sensitive personal documents such as medical records, birth certificates, or financial forms. Louis E. Slawetsky, president of Rochester, N.Y.-based research firm Industry Analysts Inc said, “People don’t think of copiers as a vulnerability … That’s a problem since they have hard drives and can store whatever has been copied for an indefinite period of time.

This creates a potential security problem: customers have access to a machine connected to the bank’s network. mitigates the danger by placing the machine behind two firewalls and making the copier password-protected. Security consultants say potential buyers of new copiers should almost always look for machines with encryption or overwriting capabilities.

Hard-copy security is also an issue — you don’t want the wrong person picking up someone else’s copy job. Hence, experts advise prospective buyers to stick to machines that come with password protection. That way, says Larry Kovnat, systems security program manager for Xerox’s office group in Rochester, N.Y., “no one can inadvertently see documents or pick them up.”

Despite the improvements in copier-machine defenses, one security hole still has not been addressed: E-mail. Although copiers generally can keep track of who is E-mailing a document (through passwords), it is nigh impossible to put limits on what can be sent or where the E-mails can be sent. This could change, however, as copier hard drives and network connections become more sophisticated.

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Anti-Spyware Best Practices

·Anti Spy-ware Best PracticesAnti Spy-ware Best PracticesMake a spyware protection company policy. To protect your business’s best interests, anti-spyware protection should be required software on every computer.

Use more than one anti-spyware application

Regardless of what anti-spyware vendors claim, you almost always need more than one program to protect against a lot of adware and spyware. Experts say the best protection you can get is only probably around 70% using a combination of the two leading anti-spyware programs.

Use a centrally managed anti-spyware solution

Centrally managed software usually works best for companies with more than just a handful of computers. Spyware protection is no different. There are several vendors, such as Webroot and CA, which offer such software. If you have roughly 10 or more Microsoft (MSFT) Windows-based computers and want to save time, effort, and money in the long term, you should definitely consider this route.

Use a layered defense

The best defense against any information threat is a layered defense. You have a greater chance of defending against spyware if you use anti-spyware software combined with anti-virus software, personal firewalls, and host anomaly detection/intrusion prevention software. You can even help prevent infections at the network perimeter by utilizing spam and content filtering for inbound emails.

Lockdown your systems

A spyware defense that deserves separate mention is to configure Windows and Internet Explorer to be more secure. There are simple things you can do that will make a world of difference. For starters, make sure your systems are configured to be “hardened” from the elements. Roberta Bragg has written extensively on this topic at SearchWindowsSecurity.com. These hardening tricks are very easy to implement, and you can even push a lot of them out via Active Directory Group Policies.

Also, configure Internet Explorer (or whichever browser you use) to have pop-up blocker protection. This feature is built into most new browsers, and there are several well-known third-party applications for this. A good one for Internet Explorer is the free Google toolbar. It not only blocks most pop-up ads that harbor spyware, it also serves as a quick and convenient way to perform Google queries while browsing the Internet.

Use a more secure browser

Internet Explorer is a huge target for pop-ups, phishing, executable code, and other hacker vectors. If possible, use a more secure Web browser such as Firefox or Opera. These browsers likely have 99% or more of the functionality your users need with less hassle.

Install anti-spyware protection before new computers are deployed

Rather than installing spyware protection and cleaning utilities after you suspect infections, put it on systems before they’re deployed into the wild. For existing systems, simply install your favorite anti-spyware application such as Spybot Search and Destroy, Ad-Aware, or PestPatrol (or a combination of two or more). Let the software clean your systems and simply keep it running full-time in the background to act as a preventative layer to keep your systems protected.

Protect every Windows-based system on your network

Anti-spyware software is no longer just for workstations – it needs to be on servers, laptops, and any system running Windows – regardless of whether or not they are networked. Windows is the OS of choice for most spyware infections (at least for now) so make sure every single Windows-based system has protection.

Remote users might not be receiving updates

If you have remote users, remember that their systems may not be receiving the proper anti-spyware and other software updates.

Educate your users

User gullibility, ignorance, and carelessness are the main causes for infection. People clicking “yes” or “OK” in pop-up windows allowing software to be installed opens up the floodgates. Downloading and running seemingly innocuous programs doesn’t help the cause either. Educate your users on what to do and what not to do. Give them examples of what can happen when spyware infects a computer and how that relates to their everyday job functions. It’s amazing how much buy-in you can get using this technique.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.