Tag Archive for 2010

GM built Robot Works for NASA

GM built Robot Works for NASANASA recently had a coming-out party at the Space Station Processing Facility at NASA’s Kennedy Space Center for one of its newest projects. The party was for a human-like robot called the Robonaut 2 (R2) developed with General Motors (GM). The R2 robot has a human shape, weighs about 300 pounds, runs on a battery. The NASA/GM-robot will join the team of the space shuttle Discovery on  STS-133 mission to the International Space Station. STS-133 is scheduled for takeoff on November 1, 2010. Although it will initially only take part in operational tests, upgrades could eventually allow the robot to realize its true purpose. R2 can help astronauts on spacewalks with tasks outside the space station.

The dexterous humanoid astronaut helper is now tweeting at www.twitter.com/AstroRobonaut.

R2 is now tweeting

With the help of its team, R2  sent its first tweet on July 26, 2010.

Robonaut 2

I liked the big blue GM logo on R2. This is another example of the value of the domestic auto industry for the good of the U.S.  Alan Taub, vice president of GM’s global research and development said in a press release, “Partnerships between organizations such as GM and NASA help ensure space exploration, road travel and manufacturing can become even safer in the future.

GM LogoGM’s manufacturing engineering team is already working to find potential applications for R2’s array of vision, motion, and sensor technologies that will aid workers in manufacturing operations. According to GM’s Taub, “The work done by GM and NASA engineers also will help us validate manufacturing technologies that will improve the health and safety of our GM team members at our manufacturing plants throughout the world.

For GM, this is about safer cars and safer plants,says the GM VP for global research and development. “When it comes to future vehicles, the advancements in controls, sensors, and vision technology can be used to develop advanced vehicle safety systems. The partnership’s vision is to explore advanced robots working together in harmony with people, building better, higher quality vehicles in a safer, more competitive manufacturing environment.”

rb-

Maybe it will be a reminder to politicians like Dick Shelby of AL who opposed loans to GM to further the interests of the foreign car assemblers in Alabama.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Norlight Bought by Windstream

The incumbent local exchange carrier (ILEC) Windstream (WINMQ) is going to acquire Q-Comm Corporation. Q-Comm is a privately held regional fiber transport and CLEC based in Overland Park, KS for about $782 million. Norlight, a wholly-owned subsidiary of Q-Comm has a fiber network in Michigan. The addition of Norlight to the Windstream market will expand its presence as a competitive force in the SMB market. Norlight currently has about 5,500 SMB customers.

Norlight map Michigan

Also included in the deal was Windstream’s purchase of Kentucky Data Link (KDL), another wholly-owned subsidiary of Q-Comm. Analysts suggest that the KDL addition by Windstream will complement its ongoing effort to upgrade and expand the fiber network in its own 16-state ILEC territory. KDL provides an additional 30,000 fiber route miles to the Windstream network. KDL has about 400 employees and provides fiber services for bandwidth-intensive customers such as wireline and wireless carriers — in 22 states.

Windstream“This transaction builds on Windstream’s strategy to become a next-generation telecom provider focused on broadband and enterprise customers,” Windstream CEO Jeff Gardner said in a release.

Windstream operates in 23 states, where it provides service for 3.3 million phone lines, 1.27 million Internet customers and 420,000 digital television customers. It has 9,500 employees and annual revenue of about $4 billion.

rb-

Windstream says it will “increase success-based capital expenditure investments in the near term” with a concentration on “the wireless backhaul and enterprise businesses.”  Let’s hope so because the broadband in Michigan is terrible. According to theory, at least, increased competition for telco and cableco should drive down prices and increase services.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

2009 SPAM results

2009 SPAM results PC World chronicles how analysts at the a California-based security company FireEye executed a plan to shut down the Mega-D (or Ozdok) botnet in early November 2009. At one point the Mega-D botnet reportedly accounted for 32 percent of all spam. In order to shut down this threat, Afit Mushtaq and two FireEye colleagues went after Mega-D’s command infrastructure.

According to the article, the botnet’s command infrastructure was its weak point. The Mega-D owned bots infesting PCs were directed from online command and control (C&C) servers throughout the world. If the bots could be separated from their controllers, the researchers found that the undirected bots would sit idle on the PC’s not delivering their malware. Mushtaq found that every Mega-D bot had been assigned a list of destinations to try if it couldn’t reach its primary command server.  Taking down Mega-D would need a carefully coordinated attack.

To coordinate the attach the FireEye team contacted the Internet Service Providers (ISP’s) that hosted Mega-D control servers. Mushtaq’s research showed that most of the Mega-D C&C servers were based in the United States, with others in Turkey and Israel. The FireEye team received cooperation for the U.S.-based IPS’s but not the overseas ISPs. The FireEye team took down the U.S.-based C&C servers.

Since the ISP’s in Israel and Turkey refused to cooperate, PC World reports that Mushtaq and company contacted domain-name registrars holding records for the domain names that Mega-D used for its control servers. The registrars collaborated with FireEye to point Mega-D’s existing domain names to no­­where. This cut off the botnet’s pool of domain names that the bots would use to reach the overseas ISP-based Mega-D C&C servers.

As the last step, PC World says that FireEye and the registrars worked to claim spare domain names that Mega-D’s controllers listed in the bots’ programming and pointed them to “sinkholes” (servers FireEye had set up to sit quietly and log efforts by Mega-D bots to check-in for orders). Using those logs, FireEye estimated that the botnet consisted of about 250,000 Mega-D-infected computers.

MessageLabs reports that Mega-D had “consistently been in the top 10 spam bots” for the earlier year. The botnet’s output fluctuated from day to day, but on November 1 Mega-D accounted for 11.8 percent of all spam that MessageLabs saw. Three days after FireEye’s operation, Mega-D’s share of Internet spam to less than 0.1 percent, MessageLabs states.

Mushtaq recognizes that FireEye’s successful offensive against Mega-D was just one battle in the war on malware. The criminals behind Mega-D may try to revive their botnet, he says, or they may abandon it and create a new one. But other botnets continue to thrive. “FireEye did have a major victory,” says Joe Stewart, director of malware research with SecureWorks in the PC World article, “The question is, will it have a long-term impact?”

Mushtaq says that FireEye is sharing its method with domestic and international law enforcement,  “we’re definitely looking to do this again,” Mushtaq says. “We want to show the bad guys that we’re not sleeping.”

rb-

The takedown of Mega-D by FireEye has had a noted decrease in the level of SPAM I observed. During the 10 months before the Mega-D takedown, the daily average of SPAM messages (DASM) received 49. After the November 2009 takedown, the DASM rate dropped to 33. A step down into the numbers reveals that the November 2009 DASM was 35 and the December DASM was 29.


The overall DASM trend line for 2009 was down. In order to keep the trend going down, firms should investigate the ShadowserverASN & Netblock Alerting & Reporting Service. This free reporting service is designed for organizations that directly own or control network space. The service provides reports detailing detected malicious activity to aid in their detection and mitigation program.  Shadowserver has provided this service for over two years and now generates over 4,000 reports nightly.  The reporting service monitors and alerts the following activity:

  • Detected Botnet Command and Control servers
  • Infected systems (drones)
  • DDoS attacks (source and victim)
  • Scans
  • Clickfraud
  • Compromised hosts
  • Proxies
  • Spam relays
  • Malicious software droppers and other related information.

Detected malicious activity on a subscriber’s network is flagged and included in daily summary reports detailing the previous 24 hours of activity. These customized reports are made freely available to the responsible network operators as a subscription service.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

The Internet as a Subway Map

The good folks over at Simply Zesty released this cool map of the inner-web tube thing.

The Internet Super Subway map

rb-

Check out their site and give them a thumbs-up. A good network diagram is always a helpful tool.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Another Tech Loss for Michigan?

Another Tech Loss for Michigan?Earlier this week Texas-based Tektronix Communications announced it had acquired Arbor Networks, which makes software for network security and management. Arbor Networks employs about 90 people in Ann Arbor and 270 worldwide. According to Xconomy-Boston. Farnam Jahanian, who is chair of computer science and engineering at the University of Michigan, formed Arbor Networks in 2000 with Rob Malan, who was Jahanian’s Ph.D. student at the U-M and is now Arbor’s chief technology officer (he will stay on as CTO).

Arbor Network’s core technology, based on Malan’s and Jahanian’s research, involves software that monitors entire computer networks, from data centers and Internet service providers to broadband customers and mobile interfaces. According to the article, the firm’s products protect its customers against all manner of security threats, most notably, denial-of-service attacks that can shut down big networks and popular websites. Jahanian and Malan’s team raised a Series A venture round in 2000, led by Battery Ventures and Cisco Systems, and then a Series B round in 2002, led by Thomas Weisel Venture Partners. Those two rounds, the only outside funding taken by the company, were worth about $33 million.

Arbor CEO, Colin Doherty, told Xconomy-Boston that Danaher (NYSE: DHR), a Washington D.C.-based technology conglomerate, owns Tektronix Communications. According to Doherty, Arbor will stay “whole and intact as an operating unit under the Danaher brand.” The company will become part of Danaher’s communications and enterprise group which comprises a half-dozen companies, including Tektronix Communications, Fluke Networks, and AirMagnet.

Arbor will give its new parent company deep Internet security knowledge, what Doherty calls a “security beachhead.” Now “they can detect, secure, and mitigate network security. It was a really good fit for them,” he says. Doherty told xconomy.com that with Danaher’s size and influence, “it’s a unique opportunity for us to change our model…and be part of a larger public vehicle.” Financial terms of the deal weren’t disclosed, and the principals at Arbor and Danaher weren’t saying much beyond the platitudes that typically follow such a merger.

For his part, Jahanian who is exiting the company calls the Danaher acquisition a natural next step in Arbor’s broader evolution. “It’s another inflection point,” he said in the article, and it will help the firm “expand into a new emerging market.” David Munson, the dean of engineering at the University of Michigan, says he is “heartened that the acquisition of Arbor Networks calls for Arbor’s research and development activity to remain in Ann Arbor. This is a cornerstone for Ann Arbor’s rapidly developing software and networking industry” in the article.

Doherty did not offer Xconomy.com many specifics on the new firm’s commitment to Michigan, other than the usual corporate platitudes that Arbor will “continue to grow our presence in Ann Arbor and in Chelmsford (MA).” However, even the U-M professor admits Michigan does not cut it for big-time Tech. “We knew we could build a phenomenal R&D team in Ann Arbor,” Jahanian says. “But to recruit the quality of executives [we wanted], we had to be either on the East or West Coast.” The combination of Battery Ventures being in the Boston area, the strong local business talent, and proximity to the East Coast’s big wireless carriers and Internet service providers swung the decision in Boston’s favor, he told Xconomy.com.

rb-

From where I sit, the DHR product lines seem to be a good match for Arbor’s, but it is only a matter of time before the bean-counters in charge at DHR decide that even a “phenomenal R&D team in Ann Arbor” is too expensive and Michigan (and the US) will lose 90 more leading-edge, well-paying jobs.  Another example of how tech unaware Michigan is that Xconomy-Detroit did not cover this, the article came from Boston.

Related articles
  • Arbor Networks Partners With Ingram Micro in Asia Pacific to Help Enterprises Mitigate DDoS Threats to Their Businesses (prweb.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.