Tag Archive for 2013

A Close Look at 802.11ac Wi-Fi

TA Close Look at 802.11ac Wi-Fiech pundits argue that the new Wi-Fi standard 802.11ac will replace wired gigabit Ethernet networking. 802.11ac is a supercharged version of 802.11n, offering link speeds ranging from 433 Mbps, up to multiple gigabits per second.

Wi-FiTo make 802.11ac dozens of times faster than 802.11n, the new standard works exclusively in the 5GHz band uses a huge chunk of bandwidth (80 or 160MHz), operates in up to eight spatial streams (MIMO), and a technology called beamforming.

At its core, 802.11ac is essentially an updated version of 802.11n, according to Sebastian Anthony the author of an ExtremeTech article “What is 802.11ac WiFi, and how much faster than 802.11n is it?” 802.11n was a huge performance increase over 802.11a and g. 802.11n introduced some key technologies that brought massive speed boosts. Where 802.11n had support for four spatial streams (4×4 MIMO) and a channel width of 40MHz, 802.11ac can use eight spatial streams and has channels up to 80MHz wide, which can be combined to make 160MHz channels. This means that 802.11ac has 8 x 160MHz of spectral bandwidth to play with, versus 4 x 40MHz – a huge difference that allows 802.11ac to send vast amounts of data across the airwaves.

Beamforming

What is new in Wi-Fi

802.11ac also introduces 256-QAM modulation (up from 64-QAM in 802.11n), which sends 256 different signals over the same frequency by shifting each signal to a slightly different phase. In theory, this quadruples the spectral efficiency of 802.11ac over 802.11n. Spectral efficiency is a measure of how well a given wireless protocol/modulation/multiplexing technique uses the bandwidth available to it.

802.11ac also introduces standardized beamforming Matthew Gast, Director of Product Management at AeroHive Networks published an article, “Investing in Beamforming: Is it worth it?” that explains beamforming.

Aerohive logoRather than transmitting a radio signal in all directions, beamforming figures out where the receiver is, and focus the energy towards the receiver. Instead of spraying radio energy all over the place, send packets as a “rifle shot” directly to the receiver’s antenna Mr.Gast explains.

Beamforming is a two-step process: First, figure out how to “aim” the transmission at the receiver, and second, send the transmission. With beamforming, a transmitter is betting that by paying the cost of the channel measurement process, the data transmission that follows will speed up enough to pay off the cost.

802.11n Beamforming was non-standardized, in 802.11ac, there is only one method of beamforming, called the Null Data Packet (NDP). (rb- Read the AeroHive article for a full description of NDP)

Aerohive’s Gast concludes that by steering the energy towards a receiver, beamforming enables you to take a step up to a higher data rate. Mr. Gast estimates that 802.11-based beamforming gives you a 3-5 dB gain.

802.11ac is speedyIn theory, at the 5GHz band with beamforming, 802.11ac should have the same or better range than 802.11n  However, Mr. Anthony says the 5GHz band, has less penetration power so it doesn’t have the same range as 2.4GHz (802.11b/g). The ExtremeTech article concludes that’s an acceptable trade-off: there simply isn’t enough spectral bandwidth in the cluttered 2.4GHz band to allow for 802.11ac’s gigabit-level speeds.

ExtremeTech‘s Anthony calculates there are two answers to how fast is Wi-Fi 802.11ac, the theoretical max speed, and the practical max speed that mere mortals will get surrounded by lots of signal-attenuating obstacles.

He calculates the theoretical max speed of 802.11ac is eight 160MHz 256-QAM channels, each of which is capable of 866.7Mbps – a grand total of 6,933Mbps, or just shy of 7Gbps. That’s a transfer rate of 900 megabytes per second. Compare this with 802.11n’s max theoretical speed, which was 600Mbps. He then says in practice, the current max speed of 802.11ac devices is 1.7Gbps.

ExtremeTech points out there will be a second wave of 802.11ac devices – due in 2014 after the standard is finalized – before 160MHz channels and multi-gigabit speeds become a reality. The max speed over an 80MHz channel is 433.3Mbps, and there aren’t any 802.11ac chipsets that support up to eight streams.

Broadcom logoKevin Fitchard at GigaOM reports that recently the Wi-Fi Alliance kicked off its 802.11ac certification program. First to get the official Wi-Fi stamp of approval was the Samsung Mega 6.3, followed by two other Samsung models.

As with the 802.11n certification process, the Wi-Fi equipment makers are moving faster than the standards bodies. The IEEE is actually still putting the finishing touches on the 802.11ac standard, which is not due until 2014.

Wi-Fi certifiedThe Wi-Fi Alliance expects the first batch of ac devices will support speeds of 433 Mbps and progress into more advanced levels of the standard. The Alliance has pre-certified systems from companies like Broadcom (BRCM), Qualcomm (QCOM), Realtek, and Marvell (MRVL). Cisco (CSCO) was one of the first vendors to get an access point certified.

“AC is going into mobile and portable devices first…,” Wi-Fi Alliance Marketing and Program Management Director Kelly Davis-Felner said. ABI Research estimates that 40 percent of all ac devices shipped in 2013 will be handsets.

rb-

Wi-Fi will replace wired Ethernet networkingWhile tech pundits argue that the new 802.11ac Wi-Fi will replace wired gigabit Ethernet networking at home and in the office. While the consumerization of IT and BYOD are strong forces, the life-cycle of cabling infrastructure is 25 years, a cost not lightly abandoned in the walls. it is more likely to happen at home first. Who wants all the crappy wires running all over the house?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Need Cyber Insurance?

Need Cyber Insurance?Standard business insurance does not cover data breaches or almost any other loss involving data. Standard insurance covers tangible losses and damage. Data isn’t tangible says Network World. The ruling that data is not tangible goes back to a 2000 ruling by a U.S. District Court. The article explains the ruling arose from an Arizona case, American Guarantee & Liability Insurance Co. vs. Ingram Micro Inc.. In that case, the court said that a computer outage caused by a power problem constituted physical damage within the meaning of the policy Ingram Micro had purchased from American Guarantee.

Courts ruled data is tangible propertyAfter that, the insurance firms changed their policies to state that data is not considered tangible property,Kevin Kalinich, national managing director for network risk at Aon Risk Solutions told Network World. The upshot is that an enterprise needs special cyber insurance to cover data-related issues. The problem is that the field is new and there is no such thing as standard coverage with a standard price.

Larry Ponemon, chairman of the Ponemon Institute, told Network World that the resulting complexity is a major source of push-back by potential buyers. “The policies have limitations and constraints similar to home policies with act-of-God provisions, and that has created a lot of uncertainty about what is covered, and what the risks are.” Mr. Ponemon told the author, “Those who are nevertheless purchasing cyber insurance are typically very selective about what coverage they want.”

Network World describes the types of cyber coverage available.

cyber coverages availableData breach coverage: This pays for expenses that result from a data breach. Covered expenses typically include notification of the victims, setting up a call center, credit monitoring, and credit restoration services for the victims, and other crisis management services, Ken Goldstein, vice president at the Chubb Group, told Network World. “You might want to hire forensic experts, independent attorneys for guidance concerning the multiple state (data breach notification) laws, and public relations experts.”

Regulatory civil action coverage: Pays in cases where the insured is facing fines from a state attorney general after a data breach, or from the federal government after a violation of the Health Insurance Portability and Accountability Act (HIPAA) or similar regulations. Some policies only cover the cost of defending against the action, while others may pay the fine as well, says Steven Haase, head of INSUREtrust, an Atlanta-based specialty insurance provider.

Cyber extortion coverageCyber extortion coverage: For cases where a hacker steals data from the policyholder and then tries to sell it back, or someone plants a logic bomb in the policy holder’s system and demands payment to disable it. Among other things, the policy should cover the cost of a negotiator, and the cost of offering a reward leading to the arrest of the perpetrator, Chubb’s Goldstein says.

Virus liability: Pays in cases where the policyholder is sued by someone who claims to have gotten a virus from the policy holder’s system.

Chubb logoContent liability: Covers lawsuits filed by people angered over something posted on the Web site of the policyholder. Such coverage should also cover copyright claims and domain name disputes, INSUREtrust’s Haase told Network World.

Lost income coverage: Replaces revenue lost while the policy holder’s computer system or Web site is down. But Aon’s Kalinich notes that insurers often apply minimum downtimes of 12 or 24 hours, or require proof of actual losses, “They’ll say that, after all, the customers who did not get through (during the outage) could have come back later.”

AON logoLoss of data coverage: Pays for the cost of replacing the policy holder’s data in case of loss, “Backup policies are not always effective, and accidents and sabotage happen,” Mr. Haase says.

Errors and omissions coverage: Otherwise known as O&M policies, this type of coverage predates cyber insurance, but is increasingly added to cyber policies to cover alleged failures by the policy holder’s software, Haase says.

Errors and omissions coverageAs for what coverage costs, Aon’s Kalinich told Network World that firms smaller than $100 million in annual revenue can expect to pay $5,000 to $15,000 per million of coverage, while larger firms would pay $10,000 to $25,000. For those over a billion, the price can be in the $20,000 to $50,000 range. Robert Parisi, senior vice president with Marsh, an insurance broker, and risk advisory firm put it simpler, saying the cost is between $7,000 and $35,000 per million. Of course, the lower ranges are for buyers who look like better risks — and deciding who is a better risk is another factor that makes cyber insurance a complex topic.

You cannot get good insurance unless you have good security practices,” VP Kalinich says. “Due diligence underwriting has become more streamlined as the insurers have learned what to look for. They will typically benchmark you against other members of your industry.

15% of the premium goes to commissionsINSUREtrust’s Haase explained the cyber insurance purchase process to the author, “This is a complex purchase and you need a professional helping you. Most policies are highly customizable, and there are a lot of endorsements.” Typically the buyer goes to their local agent, and the local agent uses a specialist, Haase says. Both the local agent and the specialist get commissions ranging from 7.5% to 10% so that 15% to 10% of the premium goes to commissions.

Finally, Toby Merrill, vice president of insurer Ace Professional Risk cautions that cyber insurance buyers must understand that if they are outsourcing their data handling, they are not at the same time outsourcing their liability if there is a data breach. The onus of the various breach notification laws is on the organization that gathered the data, not on the organization that was storing it when it was exposed, he notes.

Cyber insurance is not there to replace sound risk management,” VP Merrill told Network World, “It is there to supplement it.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Bye Bye Ballmer

Bye Bye BallmerThe next stop on the Farewell Steve tour takes up to Windows XP. The Verge reports that Steve Ballmer, who attended Lawrence Technological University in Southfield, MI before he moved on, had an hour-long town hall in the Microsoft (MSFT) HQ in Redmond to bid the MSFT worker bees adieu. At one point The Verge says an emotional Ballmer paused to “enjoy this for a minute,” with tears visibly streaming down his face. He told the audience “You work for the greatest company in the world, soak it in.

Here is another chance to enjoy the moment in an ad with Steve Ballmer and Brian Valentine in a Crazy Eddie spoof hawking Windows XP. If you listen closely at about 1:40, it sounds like Valentine even says Windows XP is secure!

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

How Does Caffeine Work?

How Does Caffeine Work? More than 80 percent of American adults drink coffee daily in such mundane settings as the office and in the car that we often forget it’s the world’s most popular psychoactive drug. The Smithsonian’s Surprising Science article This Is How Your Brain Becomes Addicted to Caffeine, reports that scientists declared caffeine chemically addictive in 1994. The latest edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM) included caffeine withdrawal as a mental disorder.

Caffeine is a naturally occurring chemical stimulant called trimethylxanthine, which in its pure form, is a white crystalline powder that tastes very bitter. Regular caffeine use alters your brain’s chemical makeup, leading to fatigue, headaches, and nausea for those who try to quit.

The article describes coffee withdrawal. Within 24 hours of quitting, withdrawal symptoms begin. Initially, they’re subtle: The first thing you notice is a mental fogginess, and lack of alertness. Muscles become fatigued, even when you haven’t done anything strenuous, and you suspect that you’re more irritable than usual. Over time, an unmistakable throbbing headache sets in, making it difficult to concentrate on anything. Eventually, as your body protests having the drug taken away, you might even feel dull muscle pains, nausea, and other flu-like symptoms.

Caffeine trainThe author explains the reason caffeine is addictive stems from the way the drug affects the human brain, producing the alert feeling that caffeine drinkers crave. Soon after you drink (or eat) something containing caffeine, it’s absorbed through the small intestine and dissolved into the bloodstream. Because the chemical is both water- and fat-soluble it’s able to penetrate the blood-brain barrier and enter the brain.

The article says caffeine closely resembles a molecule that’s naturally present in our brain, called adenosine (believed to play a role in promoting sleep and suppressing arousal)—so much so, that caffeine can fit neatly into our brain cells receptors for adenosine, effectively blocking them off. Normally, the adenosine produced over time locks into these receptors and produces a feeling of tiredness.

Caffeine and Adenosine

When caffeine molecules are blocking adenosine receptors it generates a sense of alertness and energy for a few hours. Additionally, Surprising Science notes some of the brain’s own natural stimulants (such as dopamine) work more effectively when the adenosine receptors are blocked, and all the surplus adenosine floating around in the brain cues the adrenal glands to secrete adrenaline, another stimulant.

For this reason, caffeine isn’t technically a stimulant on its own, says Stephen R. Braun, the author or Buzzed: the Science and Lore of Caffeine and Alcohol, but a stimulant enabler: a substance that lets our natural stimulants run wild. Ingesting caffeine, he writes, is akin to “putting a block of wood under one of the brain’s primary brake pedals.” This block stays in place for anywhere from four to six hours, depending on the person’s age, size, and other factors, until the caffeine is eventually metabolized by the body.

In people who often invoke this process (i.e. coffee/tea, soda or energy drink addicts), the brain’s chemistry and physical characteristics actually change over time as a result. The most notable change, the author says, is that the brain grows more adenosine receptors. This is the brain’s attempt to maintain equilibrium in the face of a constant onslaught of caffeine, with its adenosine receptors so regularly plugged (studies show that the brain also responds by decreasing the number of receptors for norepinephrine, a stimulant). This explains why regular coffee drinkers build up a tolerance over time—because you have more adenosine receptors, it takes more caffeine to block a significant proportion of them and achieve the desired effect.

This also explains why suddenly giving up caffeine entirely can trigger withdrawal effects. The underlying chemistry is complex and not fully understood, but the Smithsonian reports that your brain is used to operating in one set of conditions (with an artificially inflated number of adenosine receptors, and a less norepinephrine receptors) that depend upon regular ingestion of caffeine. Suddenly, without the drug, the altered brain chemistry causes all sorts of problems, including the dreaded caffeine withdrawal headache.

The article has good news, compared to many drug addictions, the caffeine effects are relatively short-term. To kick the habit, you only need to get through about 7-12 days of symptoms without drinking any caffeine. During that period, your brain will naturally decrease the number of adenosine receptors on each cell, responding to the sudden lack of caffeine ingestion. If you can make it that long without a cup of joe or a spot of tea, the levels of adenosine receptors in your brain reset to their baseline levels, and your addiction will be broken.

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

LA Schools iPads Hacked In A Week

– UPDATE 08-28-2014 – Just in time for the start of School reports surface LAUSD is “re-opening” bids for its controversial billion-dollar contract with Apple and Pearson to give all students, teachers, and administrators iPads.

LA iPads Hacked In A WeekThe second-largest school district in the US is spending at least $1 Billion to complete a 1:1 tablet initiative. The Las Angles Unified School District (LAUSD) plans to deploy 650,000 Apple (AAPL) iPads, one for each student in LA county. The project slated to be completed by December 2014, has had problems that may prevent if from reaching that goal.

Las Angles Unified School DistrictThe project includes 500 million dollars for iPads and 500 million dollars for Wi-Fi and related infrastructure. The initiative is funded mostly by voter-approved school construction bonds, which taxpayers typically pay off over 25 years which the LA Times says “has sparked some concerns and legal and logistical hurdles.”  (rb- I first noted the project here)

The project has run into a series of issues. The first issue focused on the 25 year payback period on a $500.00 device. A second issue emerged in September 2013 when the district recognized that it may need to buy Bluetooth keyboards for the iPads. The LA Times estimated a bill of $38 million for the oversight. The LA Times reports that the included software keyboard on the iPad might not satisfy the needs of older students writing term papers.

650,000 Apple iPads,Also, LAUSD has planned to use the iPads for testing based on new Common Core English and math learning standards. The article contends that the iPad’s touch screen could frustrate students and even obscure portions of a test item that would be visible in its entirety on a full screen. (rb- I talked to many school districts about the SBAC keyboard testing issue, who is going to configure Bluetooth on and off? What about power? Does Bluetooth decrease the battery time on the iPad? Do you have enough electrical outlets to plug in 30 iPads? How is your Wi-Fi?)

In late September 2013, the LAUSD iPad project ran into a bigger problem as they deployed the iPads to high school students. According to the LA Times, it took exactly one week for nearly 300 students at Theodore Roosevelt High School to defeat the LAUSD installed device security. Following the news that students were using the hacked tablets for personal use, district officials halted home use of the Apple tablets until further notice.

Common Core English and math learning standards.Students told the LA Times once they had the iPad home they could not do anything with the $678 device. Apparently, the students began to tinker with the security lock on the tablets and soon discovered all they had to do was delete their personal profile information. With the profile deleted, a student was free to surf, tweet like, and stream music.

The new found freedom prompted L.A. Unified School District Police Chief Steven Zipperman to suggest that the district might want to delay the distribution of the devices. The chief said in a memo obtained by the LA Times, I want to prevent a ‘runaway train‘ scenario when we may have the ability to put a hold on the roll-out.

I want to prevent a 'runaway train' scenarioAccording to a March 2013 blog post from Roosevelt HS, LAUSD chose AirWatch as the provider for the mobile device management system. And that when students first get their iPads they will have AirWatch already installed. The district posted an update on their website that indicated they have turned to AirWatch and Apple for better solutions to their iPad problem.

rb-

This really is a story of mismanagement from the top down. A billion-dollar project for consumer devices financed over 25 years – Really? Are the students of LA’s class of 2038 going to have to use the iPad’s from 2013? Where is the refresh program? How are they getting the money to buy 650,000 iPad 9’s in 5 or 6 years?

If the iPads are to be used at home? how is LAUSD addressing the digital divide in LA?

Did the big-wigs consider the equity of using iPads for high-stakes nationwide common core testing? Not only will LA students be compared against each other and the rest of California but also students in 44 other states.  It is my understanding that the current SBAC test is not optimized to display well on small screens. Will the tablet form factor handicap LA students or others across the US using tablets when competing against others using large screens and real keyboards in ergonomically proper positions? Will LAUSD show the test takers how to see the entire question, or how to easily switch between back and forth between screens to review a passage and then write a response.

Call me cynical after working in K-12 and living in the Detroit area, but a public $1 Billion dollar government project seems like a magnet for mismanagement, fraud, waste, and pay-to-play scams. It already seems to be at least $20 million over budget to buy keyboards even at K-12 discounts. Hopefully, the iOS and AirWatch updates are already included in the existing contracts.

While the headline-grabbing hacking story may be resolved in Apple’s iOS7. AFAIK Apple does not let anybody into its BIOS or whatever chip it is on an iPad. That is why students can easily delete the AirWatch agent. LAUSD still has a task on its hands to get all the deployed devices up to iOS 7.

LAUSD is missing 71 iPadsIn more signs of mismanagement, The LA Times reports that LAUSD is missing 71 iPads. They deployed 69 of the missing iPads last year at the Valley Academy of Arts and Science. PadGadget reports that after the fact, the District ramped up its tracking efforts by adding stronger safeguards. Global positioning can now be activated for every tablet. Plus, an electronic inventory system registers who is now responsible for a particular device, and District officials can remotely shut down iPads reported stolen.  Lt. Jose Santome of the school district’s Police Department stated, “We know what’s going out and deployed on every campus.”

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.