Tag Archive for 2012

Order A Pizza With IoT

Order A Pizza With IoTA pizzeria in Dubai has unveiled a new refrigerator magnet that can order a pizza with a single tap. Samantha Murphy at Mashable reports that a pizza box-shaped magnet called the VIP Fridge Magnet is connected to Red Tomato Pizza in Dubai.

The magnet is preset to order a pizza online and is networked to the Internet of Things via a  Bluetooth connection on a smartphone. Red Tomato Pizza then sends a confirmation text and delivers the pizza soon after. You can also update your pizza selection online at any time.

Order Red Tomato PizzaThis isn’t the first time a pizza company has used modern technology to make ordering easier. Ann Arbor, Michigan based Dominos Pizza (DPZ) has an app that allows users to place, customize and pay for their order with a few taps.

Ms. Murphy points out that refrigerators have also recently been in the spotlight for embracing the web. In fact, Samsung touted a refrigerator that tweets, plays music, and even displays your Google Calendar. Meanwhile, LG announced earlier this year a new line of smart appliances, including a refrigerator that helps you maintain your diet, sends recipes to your smart oven and even keeps you posted when you run out of certain groceries.

rb-

This is a great example of the “Internet of Things” by creating a new application by combining the IP network, Bluetooth networking, and smartphone technologies to do a task with very little human interaction.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Amazing Video of Michigan at Night from Space

Amazing Video of Michigan at Night from SpaceThe crew of Expedition 30 onboard the International Space Station took this amazing NASA video of Michigan. The video begins looking northeast over Texas, where cities like San Antonio, Houston, and the Dallas/Fort Worth area can be seen.

Continuing northeast over the Great Plains states, cities like Oklahoma City, Kansas City, and St. Louis can be easily distinguished. The pass continues over the familiar shape of Michigan, with Chicago and Detroit visible. As the ISS continues northeast, the Aurora Borealis can be seen over Canada.

 

The sequence of shots was taken on January 30, 2012, from 06:13:36 to 06:23:09 GMT, on an ISS pass from northern Mexico to northwest New Brunswick.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Power over Ethernet 802.3af

Power over Ethernet 802.3afA client recently asked what happened to the network design rule of thumb which said do not install data cables anywhere near electrical cables? The fear of cross-talk, interference, and corruption of the data traffic seems to have disappeared with Power over Ethernet (PoE). He rightly pointed out that now it seems OK to mix data and power in the same cable going to a networked device. 

Read part 2 here.

Plain Old Telephone SystemPoE is similar in principle to the way that the copper wire pair that carries your POTS (Plain Old Telephone System) telephone signals into your house also carries enough electricity (48v DC) from the telco Central Office to power the phone’s core elements of the headset, dial, and ringer. Power over Ethernet’s development started with early implementations of Voice over Internet Protocol VoIP)phone systems. VoIP pioneers did not have a telco CO to power the phones and powering the VoIP phones with wall warts proved unreliable. The phones stopped working when unplugged from the wall or if the building lost power.

In 2000 Cisco (CSCO) developed the first successful technique of putting 48v DC on the LAN data cable along with the data traffic. This proprietary system allowed Cisco to overcome customer objections to wall warts and sell a lot of VoIP systems.

Cisco logoCisco’s original PoE equipment was capable of delivering up to 10W per port. The endpoint and the Cisco switch negotiated the amount of power to be delivered based on a power value in the proprietary Cisco Discovery Protocol (CDP). The Power Sourcing Equipment (PSE) will send a Fast Link Pulse (FLP) on the transmit pair. The Powered Device (PD) connects the transmit line to the receiving line via a low pass filter. And thus the PSE gets the FLP in return. Cisco’s original PoE implementation is not software upgradeable to the IEEE 802.3af standard. Cisco manufactured many IP phones and WLAN access points devices that were not compliant with the IEEE 802.3-2005 Clause 33 including:

Cisco pre-standard IP phones
7985G7960G7940G7910G7910G + SW
7912G7905G7902G7970G
Cisco IEEE 802.3af and pre-standard IP phones
7970G7961G7906G7941G
7911G7962G
The Cisco 7936 Conference Phone does not support any LAN based power and requires a Cisco power injection adapter
Source

Throughout 2001 and 2002, other VoIP and Wireless Access Point (WAP) vendors saw Cisco’s success and developed their own proprietary (and often non-interoperable) powering systems. As more proprietary systems were developed the Institute of Electrical and Electronics Engineers (IEEE) recognized the need to standardize PoE. The IEEE 802.3 Ethernet Committee assigned PoE technology to a new working subcommittee called 802.3af. The IEEE working group’s charge was to create a standardized version of the Power Over Ethernet so that any manufacturer who wanted to could make their products PoE ready. The IEEE working group took commentary from 2001 to 2003 and released the ratified IEEE 802.3af-2003 Power over Ethernet standard in June 2003 which added clause 33 to the IEEE 802.3 standard

Institute of Electrical and Electronics Engineers (IEEE) 802.3 Ethernet CommitteeThe 802.3af document describes how PoE systems should work.  The standard defines two types of PoE equipment, Power Sourcing Equipment (PSE) and the Powered Device (PD). Power Sourcing Equipment sends the power out over the LAN cabling system to the Powered Device. The PSE would send out a maximum of 15.4 watts DC per link to each device, (limited to standard Ethernet distances). 12.95 watts are assumed to be available at the PD because some power is lost in the cable.

The nominal voltage is 48 V, over two of the four available pairs on a Cat. 3/Cat. 5e cable. “Phantom power” is used to allow the powered pairs to also carry data. This permits PoE to be used with 10BASE-T and 100BASE-TX, which use only two of the four pairs in the cable, but also with 1000BASE-T (gigabit Ethernet), which uses all four pairs for data transmission. This is possible because all versions of Ethernet over twisted pair cable specify differential data transmission over each pair with transformer coupling; the DC supply and load connections can be made to the transformer center-taps at each end. Each pair thus operates in “common mode” as one side of the DC supply, so two pairs are required to complete the circuit. The polarity of the DC supply may be inverted by cross cables; the powered device must work with either pair: spare pairs 4-5 and 7-8 or data pairs 1-2 and 3-6. Polarity is required on data pairs and ambiguously implemented for spare pairs, with the use of a bridge rectifier. (Source)

VOIP devicesPower Sourcing Equipment can be in two form factors. A PSE can be implemented as an endspan which is an Ethernet switch with powered ports (a PoE enabled switch) or midspan which is a power hub that is used along with a non-powered switch the end-user already has in place. PD’s can receive PoE equally well from either type of PSE per the standard. The decision to use an endspan or a midspan is left up to the end-user.  The end device can use either powering technique.

The Powered Device (PD) is a network device like VoIP phones, Wireless Access Points, and IP cameras. which are capable of taking the power off the LAN cable, through the RJ-45 (8P8C) connector and using it to power itself. Some pre-standard PoE devices are incompatible with 802.3af equipment. More PoE ready PD’s are available every year  PoE ready end devices can reduce installation costs by as much as 90% over traditional powering techniques.  Among the newer PoE PD’s devices on the market or coming soon are IP Paging, Speaker Systems, POS Terminals, Door and Gate Security hardware, Public Information signs, Building Access, Temperature Control Systems, Stage Lighting, and Computers. These newer PD’s were pushing 802.3af to its limits and the IEEE began work to evolve the standard. This power limitation prevented “high power” devices that required up to 30W to be supported via the industry-standard PoE solution.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Neil Young and Bill Ford

Neil Young and Bill FordBill Ford, executive chairman of Dearborn, Michigan-based Ford Motor Company (F), was recently approached by audiophile Neil Young to build Hi-Fi digital audio into Ford cars according to Mother Nature News.  “Three months ago, Neil Young came to see me with a music proposal for cars,” Ford told the New York Times’ Jim Motavalli during the Detroit Auto Show. “Today’s digital MP3 format is horrible,” he quotes Young as saying. “The only truly good format is the vinyl LP —you can hear my fingers bearing down on the frets.

Ford Motor CompanyThe Rock and Roll Hall of Famer releases his archival material in Blu-ray and wanted Ford to put music-friendly Blu-ray players in cars, but it’s a hard sell according to the article. “We looked into at Young’s stuff but it wasn’t that user-friendly,” said Ford. “We decided it was a music format that only real purists would know about.

MNN reports that if you want the definitive version of Neil Young Archives, Vol. 1: 1963-1972 you have to cough up $349 for the 11-disc Blu-ray box. The CDs are just $100, and probably good enough for mere mortals. CNET says don’t waste your money:

The Blu-ray features ultrahigh resolution 24-bit /192 kHz stereo sound, which you can play over some newer AV receivers, but I’m not so sure that any high-end electronics can access the superduper-sounding PCM track … Don’t buy the Blu-ray box for the sound; the DVDs are fine.

Neil YoungCNN reported a year ago that Apple (AAPL) has talked with record executives about making high-def files compatible with iPods, and there’s probably a market for that among the same kind of people who pay a premium for “virgin vinyl” records.

rb-

While I enjoy Brother Neil’s music, I already own After The Gold Rush, Live Rust, Rust Never Sleeps and Freedom in four formats, vinyl, cassette, CD, and some of the tunes on iPod why would I want another one? How good is it going to sound in the car while I’m driving down US-23 at 75 MPH? Sorry Neil not for me.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Social Media Biggest Risk in 2012

Social Media Biggest Risk in 2012The Security Labs over at Websense (WBSN) a provider of Web, data, and email content security have used the Websense ThreatSeeker Network (PDF) which provides real-time reputation analysis, behavioral analysis, and real data identification to announce (PDF) their picks for the top IT security threats for 2012. Social media is the #1 risk in 2012,.

1. Websense says that stealing, buying, trading credit card, and social security numbers is old news. They say that your social media identity may prove more valuable to cybercriminals than your credit cards.

LinkedIn connections for saleToday, your social identity may have greater value to the bad guys because Facebook (FB) has more than 800 million active users. More than half of FB users log on daily and they have an average of 130 friends. Trust is the basis of social networking, so if a bad guy compromises social media logins, the security firm says there is a good chance they can manipulate your friends. (Stacy Cowley at CNN Money has an excellent article on how this can work with LinkedIn (LNKD). Which leads to their second prediction.

2. According to Websense most 2012 advanced attacks’ primary attack vector will blend social media “friends,” mobile devices, and the cloud. In the past, advanced persistent threats (APTs) blended email and web attacks together. In 2012, the researchers believe advanced attacks could use emerging technologies like: social media, cloud platforms, and mobile. They warn that blended attacks will be the primary vector in most persistent and advanced attacks of 2012.

iPad malware3. The San Diego CA-based firm says to expect increases in exposed vulnerabilities for mobile devices in 2012. They predict more than 1,000 different variants of exploits, malicious applications, and botnets will attack smartphones or tablets. Websense security investigators predict that a new variant of malware for mobile devices will appear every day.

The Internet security firm stresses that application creators need to protectively sandbox their apps. Without sandbox technology malware will be able to get access to banking and social credentials as well as other data on the mobile device. This includes work documents and any cloud applications on that handy device. The firm believes that social engineering designed to specifically lure mobile users to infected apps and websites will increase. Websense predicts the number of mobile device users that will fall victim to social engineering scams will explode when attackers start to use mobile location-based services to design hyper-specific geolocation social engineering attempts.

SSL/TLS blindspot4. SSL/TLS will put net traffic into a corporate IT blind spot. Two items are increasing traffic over SSL/TLS secure tunnels for privacy and protection. First, the disruptive growth of mobile and tablet devices is moving packaged software to the cloud and distributing data to new locations.

Second, many of the largest, most commonly used websites, like Google (GOOG) Search, Facebook, and Twitter have switched their sites to default to HTTPS sessions. This may seem like a positive since it encrypts the communications between the computer and destination. But as more traffic moves through encrypted tunnels, Websense correctly says that many traditional enterprise security defenses (like firewalls, IDS/IDP, network AV, and passive monitoring) will be left looking for a threat needle in a haystack, since they cannot inspect the encoded traffic. These blind spots offer a big doorway for cybercriminals to walk through. (We have started to battle this as we move from a POC system from McAfee another vendor to a modem content filter to be nameless but was just bought and we haven’t solved it yet, the NoSSLSearch for GOOG still needs some work)

Network security5. For years, security defenses have focused on keeping cybercrime and malware out (Also called M&M security, hard on the outside, soft and chewy on the inside). The Websense Security Lab team says that there’s been much less attention on watching outbound traffic for data theft and evasive command and control communications. The researchers say hacking and malware are related to most data theft; they estimate that more than 50 percent of data loss incidents happen over the web. This is aggravated by delayed DLP deployments as vendors use traditional overly excessive processes like data discovery (designed to over-sell professional services?).

In 2012, organizations will have to stop data theft at corporate gateways that detect custom encryption, geolocations for web destinations, and command and control communications.  The security firm predicts organizations on the leading edge will add outbound inspection and will focus on adapting prevention technologies to be more about containment, severing communications, and data loss mitigation after an initial infection.

Black-Hat-SEO_full6. The London Olympics, U.S. presidential elections and Mayan calendar apocalyptic predictions will lead to broad attacks by criminals. SEO poisoning has become an everyday occurrence. The Websense Security Labs still sees highly popular search terms deliver a quarter of the first page of results as poisoned.

The researchers expect that as the search engines have become savvier on removing poisoned results, criminals will port the same techniques to new platforms in 2012. They will continue to take advantage of today’s 24-hour, up-to-the-minute news cycle, only now they will infect users where they are less suspicious: Twitter feeds, Facebook posts/emails, LinkedIn updates, YouTube video comments, and forum conversations. Websense recommends extreme caution with searches, wall posts, forum discussions, and tweets dealing with the topics listed above, as well as any celebrity death or other surprising news from the U.S. presidential campaign.

Scareware7. Scareware tactics and the use of rogue anti-virus, will stage a comeback. With easy to acquire malicious tool kits, designed to cause massive exploitation and compromise of websites, rogue application crimeware will reemerge Websense says. Except, instead of seeing “You have been infected” pages, they expect three areas will emerge as growing scareware subcategories in 2012: a growth in fake registry clean-up, fake speed improvement software, and fake back-up software mimicking popular personal cloud backup systems. Also, expect that the use of polymorphic code and IP lookup will continue to be built into each of these tactics to bypass blacklisting and hashing detection by security vendors. (Rival IT Security firm GFI Software proves Websense’s point by reporting a “new wave of fake antivirus applications (or rogue AV)” since the start of the year and are “a popular tactic among cybercriminals.”)

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.