Tag Archive for 2013

DDoS Attack Map

DDoS Attack MapHelp Net Security points out a report that DDoS attacks continue to be a global threat. The report is from Arbor Networks a leading provider of DDoS and advanced threat protection solutions for enterprise and service provider networks. Arbor has noted an alarming increase in distributed denial of service (DDOS) attack sizes this year. The Arbor Networks ATLAS monitors a significant part of all Internet traffic and found that DDoS attack size accelerating rapidly:

  • Arbor Networks logo54% of attacks year to date are over 1 Gbps.
  • 37% of attacks this year are in the 2 – 10 Gbps range.
  • 4% of all attacks are over 10 Gbps.
  • The 2013 average DDoS attack is 2.64 Gbps, up 78% from 2012.
  • The largest monitored and verified attack size was 191 Gbps.

DDoS Attack Map Tool

One way to visualize what these facts mean is the DDoS Attack Map Tool pointed out by Brad Reese.com. The tool, built by a collaboration between Arbor Networks and think tank Google Ideas presents a global map with a data visualization map of global distributed denial of service attacks. Google Ideas uses anonymous data from Arbor Networks’ ATLAS global threat monitoring systems. Atlas can monitor up to 69 Tbps of Internet traffic. Researchers and users can use the DDoS Attack Map Tool to explore historical trends in DDoS attacks. They can make their own connection to related news events on any given day. The data is updated daily, and historical data can be viewed for any country worldwide.

DDoS Attack Map Tool

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

IT Departments Gone in 5 Years

IT Departments Gone in 5 YearsIT departments will be done in the enterprise within the next five years according to a group of CEOs and VPs. They predict that consumerization of IT and self-service trends will lead to a restructuring of today’s IT shop, leaving behind a hybrid model consisting of tech consultants and integrators. Brandon Porco, chief technologist & solutions architect at Northrop Grumman recently told a group at the CITE Conference and Expo.

The business itself will be the IT department. [Technologists] will simply be the enabler

IT Departments are targetsComputerworld reports that Kathleen Schaub, VP of research firm IDCs CMO Advisory Practice, echoed Mr. Porco. She said many corporate IT organizations now report to the head of the business unit it is assigned to. “The premise is that wherever IT sits in an organization will dictate what they care about,” she said. “If they’re in finance, they’ll care about cost-cutting. If they’re in operations, they’ll care about process management. If [the company] decides it wants to focus on the customer, they’ll put it in marketing.

John Mancini, CEO of the Association for Information and Image Management (AIIM), agreed with Mr. Porco, saying that in the consumer technology era, it’s the business side that has all the tools, so it will be able to trump IT’s desire to control who uses what and how.

functional business spending will outpace IT's spending.While the business can dictate the service or technology it wants, IT can influence the decision. Nathan McBride, VP of IT & chief cloud architect at AMAG Pharmaceuticals told Computerworld, “We’re not trying to be ahead of the technology curve and we don’t’ want to be behind, but we’re trying to maintain pace to know what they’re going to ask for next before they ask for it.

Help Net Security points out a recent IDC study that found 61% of enterprise technology projects are now funded by the business and not the IT department. IDC says IT spending driven by the functional business areas will outpace IT’s own spending. Today’s business executives who are more tech-savvy, have easier access to technology through the Cloud, and are under pressure to quickly implement new technology initiatives are driving this change.  The Help Net Security article states that today’s line of business employees are looking more and more like an extension of the IT department as, on average, 8% are technical staff.

Center of the universeAnother concern raised is whether IT is losing control as consumer technology becomes part and parcel of everyone’s work in the enterprise, and the data center is left behind. AMAG’s McBride told the audience, that in five years, companies will have to make sure they’re matching their enabling technology to the demographic of that time. He said 75 Fortune 100 companies now use Google (GOOG) Apps along with most Ivy League schools, meaning that the next generation of workers won’t be users of Microsoft (MSFT) Exchange or Office.

While the CIO position will likely stay in an enterprise, his or her role will morph into a technology forecaster and strategist, and not a technology implementer, according to Northrop Grumman’s Porco.

 rb-

This sounds like a solid case for training technical staff in project principles and increasing the number of IT project managers. There have to be clear two-way communications between the business owner and the implementers.

Requirments ?Proper and detailed scope definition is one of the most critical steps for the success of any project. The business team, implementation team, and operations team must get together before the work starts to check the proposed solution and work through all the questions, concerns, and gotchas before the project even starts. This way problems can be discovered. Once the requirements are defined and the scope is complete and everyone agrees, then the project can be signed off and a formal kick-off meeting can be held.

In IT projects, it is important to look beyond the defined project to ensure success. Does the plan consider impacts on end-users?

  • Does the project need new policies or procedures? If something falls through the cracks, they blame your project.
  • Does the PC fleet meet requirements? Do they need more RAM? If they have to upgrade, they blame your project.
  • Does it work with your current server OS? If they have to upgrade, they blame your project.
  • What about the software? Are you locked into IE only? Do you need a specific level of .NET? Does it work on iOS and Android? If they don’t have the right software, they blame your project.
  • How much bandwidth does the new project require? Will it try to send a graphical interface to a remote office on a slow link? If it loads slow they blame your project.
  • Training? If the end-users can work the program, they blame your project.
Related articles
  • IT morphs as tech and users change (networkworld.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Farewell Steve Tour

Farewell Steve Tour MicrosoftThe Bach Seat Steve Ballmer farewell tour continues as rumors swirl about Ford (F) CEO Alan Mulally taking over at Microsoft. Or will Bill Gates returning ala Steve Jobs to save Redmond. Whatever the grand poobah’s at MSFT are thinking. They will probably never find another CEO like Steve.

Here is newly minted CEO Ballmer opening up the company’s 25th Anniversary in September 2000, doing what he calls a “monkey dance” and shouting “give it up for me!” When he finally calms down, barely able to speak between gasps of air, he manages to shout four words: “I .. Love … This … Company!

 

Related articles
  • Microsoft Corporation (MSFT): Will Bill Gates Return As CEO? (valuewalk.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Whats a Petabit Network

Whats a Petabit NetworkSeems like it was a couple of months ago, we were excited about fiber optic cable that twisted light to carry data at 1.6 Tbps per strand. Now a Petabit network is the new benchmark. U.K. and Japanese researchers mashed up software-defined networking (SDN) and multicore fiber to produce the first Petabit pipe according to Kevin Fitchard at GigaOM. A Petabit is one quadrillion (1,000,000,000,000,000 or 1015) bytes binary digits or one thousand Terabits.

Petabit network uses multicore fibers

Whats a Petabit NetworkThe researchers mashed up multicore fibers and SDN to makes very high-speed networks programmable. GigaOM speculates this will allow carriers to adjust the network capacity and latency to meet the needs of traffic traveling over their networks. First, GigaOM explains that the fiber is unlike today’s single strands of glass, or cores, that carry a single beam of light down the fiber. Multicore fiber is exactly what its name implies: multiple cores each carrying a single core’s worth of capacity over the same link. Professor Dimitra Simeonidou at the University of Bristol called current single-core fiber a capacity bottleneck.

Space Division Multiplexed

The multicore group, led by NICT and NTT in Japan which built a 450 km (280 miles) section of fiber optics using 12 cores in two rings capable of transmitting 409 Tbps in either direction. That’s 818 Tbps in total. Which is within spitting distance of seemingly mythical Petabit speeds according to GigaOM. The MCF research relies on Space Division Multiplexed (SDM) provided by the multicore fibers.

ResearcherIn order to control the massive bandwidth, a team from the High Performance Networks Group at the University of Bristol created an OpenFlow software-based control element to manage those enormous capacities. The Brits implemented an interface that dynamically configures the network nodes so that it can more effectively deal with application-specific traffic requirements such as bandwidth and Quality of Transport.

According to the researchers, this was the first time SDN was used on a multicore network. The University of Bristol presser announcing the new technology says this technology will overcome critical capacity barriers, which threaten the evolution of the Internet.

rb-

OK, so that really – really – really fast. We also know from a 2011 New Scientist article that the total capacity of one of the world’s busiest routes, between New York and Washington DC, is only a few Terabits per second. With bandwidth-hungry applications like cloud computing, social media, and video-streaming continuously growing it forces network planners at firms like AT&T (T), Verizon (VZ), and the NSA to find new ways to grow their capacity.

Data center

Comcast (CMCSA) just finished a 1 Tbps network field trial on a production network between Ashburn, VA, and Charlotte, NC. Most likely the first place Pbps networking will be used is in the mega-data centers of the likes of Google (GOOG), Facebook (FB), or Microsoft (MSFT).

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

More Tech Trouble at School

More Tech Trouble at SchoolIt’s not a good time for tech in schools. The security woes at school are not limited to the iPad debacle at LAUSD. (rb- You can see my coverage here – Updates since the first article – LAUSD started confiscating the iPads and delayed the district-wide roll out one year until 2015.) GigaOM’s Ki Mae Heussner writes that Guilford County Schools in North Carolina has suspended its tablet program with Rupert Murdoch’s News Corp’s Amplify after reports of faulty equipment.

NC school district suspends tablet program

uspended its tablet programThe district reportedly spent $16.4 million ($299 / device + a 2-year subscription at $99 per year) of a $30 million Race to the Top grant to pay for the tablets and content. The device is a 10-inch ASUS (2357) tablet running the Google (GOOG) Jellybean Android operating system. It comes pre-loaded with content and apps curated by Amplify. It enables teachers to distribute content across a class or grade level and control the content on students’ screens.

GigaOM cites the school district’s website, which says they have sent 10% of their 15,000 devices back to Amplify because of broken screens. About 2,000 cases have also been problematic. In one instance, a student returned a defective charger, reporting that overheating caused the plastic to melt. While the district said it expected a few glitches with the rollout, school officials decided to pause the program for safety’s sake. GigaOM claims the pause is a big setback for Amplify, which launched its education-optimized tablet at hipster South by Southwest earlier this year.

NewsCorpSince its launch, skeptics have wondered how schools would respond to the privacy questions and the prospect of doing business with Amplify’s parent company News Corp. (given its phone-hacking scandal). Ms. Heussner speculates that the suspension could give schools more reason for pause when it comes to embracing the new technology.

Asus told GigaOM that out of 500,000 chargers of its kind that they have shipped globally, only the one in Guilford overheated and melted. Justin Hamilton, Amplify’s SVP of corporate communications seems to be blaming the customer. He claimed the broken screen rate in Guilford is higher than in other school districts. “We’re working very closely with the district on this and hope to have things resolved and the program back up and running very soon,” Mr. Hamilton said.

Indiana mobile security fail

circumvented the security on district-issued Apple iPadsIn Indiana, Education Week reports that between 300 and 400 students in the Center Grove school district circumvented the security devices on district-issued Apple (AAPL) iPads within hours of receiving the devices according to a report last week in the Daily Journal.

Apparently, students found ways to reprogram the iPads so they could download games and apps for social media sites, according to the report. Center Grove officials attributed the problem to their security program not being able to handle the 2,000+ devices they distributed.

spread like wildfireKeith Krueger, the CEO for the Consortium for School Networking, said such problems are increasingly common as districts deploy an increasing number of devices. “Kids and adults find ways to hack through things, and it can spread like wildfire,” he said. “It’s frustrating, and it’s a huge challenge for any district.

Data center failures

In addition to the tablet troubles, Data Center Knowledge’s Rich Miller reports several school data center failures. According to DCK, two public school systems suffered data center failures that crippled their IT systems.

data center fire suppression systemIn Oregon, the Beaverton School District experienced several days of disruption after an errant alarm set off its data center fire suppression system. The fire suppression system damaged hard drives and servers. That left Beaverton schools unable to use email or access class lists, student schedules, and online textbooks. “It knocked all of the systems in the data center off-line,” said Steve Langford, chief technology officer. “All of the systems that staff needs to do their jobs.” District IT staff worked over the Labor Day weekend to replace the damaged systems.

In California, the Davis Unified School District started school without key IT services after the district’s servers overheated. DCK reports an air conditioner unit failed, allowing the temperature in the server room to rise to 120 degrees F. “There’s an incredible impact on everyone in the whole organization,” says the district’s Kim Wallace. “Students can’t access computers. Teachers can’t take attendance. Parents can’t email. We can’t email out.” The DCK article said staff were still troubleshooting damaged equipment and lost data.

rb-

The best strategy, COSN’s Krueger said, is to combine the best possible security filters and other technical measures with a comprehensive responsible or acceptable use policy that students and families must sign and a commitment to enforcement. “It’s not surprising that a school district would have some breaches,” he said. “The question is how do you leverage it into a teachable moment?”

Who needs the teachable moment? Sure the kids need to understand there are real consequences for their actions but, can the politicians administrators be taught to be serious about IT? Seems to me that most of these failures are management failures. It is probable that these failures could have been reduced with proper project management.

proper project managementIt is my experience that many administrators do not recognize project management professionals. It appears they would stick with the good ole boy network and hire their less qualified friends or the professional BSer’s.

Now about project management? Modern backup system? Disaster Recovery plan?  BCP?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.