Tag Archive for 2014

How Amazon Delivers

How Amazon DeliversNow much did you spend with Amazon (AMZN) this Cyber-Monday? Here is how they process all of those orders. CNet says, customers ordered more than 36.8 million items globally or 426 items per second from the online giant. They use robots like these…

.

The 10 Amazon fulfillment centers in California, Texas, New Jersey, Washington, and Florida use:

  • More than 15,000 Kiva robots.
  • Robo-Stow, one of the largest robotic arms on Earth for moving large quantities of inventory for customer order fulfillment.
  • New vision systems for enabling the unloading and receipt of an entire trailer of inventory in as little as 30 minutes instead of hours.
  • High-end graphically oriented computer systems for employees to use while fulfilling orders for customers.

Kiva robotUSA Today reports the Kiva robots are about a foot tall and weigh about 350 pounds and can lift 700 pounds. They can travel at 5 mph. The Kiva software determines which items each human packer needs and in what order and sends instructions to the robots.

The Kiva-bots follow bar-coded stickers on the floor, to bring a line of shelving units to the human packers, stopping just long enough for the correct item to be plucked from the shelf. Then the Kiva robot carries the whole unit back to its place and goes to get another one.

rb-

Despite the robotic army, AMZN says they plan to hire 80,000 seasonal employees this year, a 14 percent increase from last year. They also claim to retain thousands of those new employees in regular, full-time roles after Christmas. We will see about the jobs.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Happy Thanksgiving

Happy Thanksgiving

 

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Encryption on the Internet Primer

Encryption on the Internet PrimerI spoke to several of my mother’s friends the other day. They were all worried about being on the web. Kudos to these ladies for being connected at all (they are in their 70’s and 80’s), They also get a gold star for being alert enough to recognize that something on the ol’ Intertubes has changed recently.

Data theftThey hear that their information is being stolen at the banks and stores they frequent. One neighbor lady even said she was worried but the government stealing her data. I explained to the group that I too am concerned about how it seems everyone on the web is under attack lately.

I gave them the usual pointers. Don’t trust anything on the web.  Have someone (not me!) help keep their anti-malware and systems up to date. And use encryption if possible.

Navajo Code Talkers

Of course, none of my mother’s neighbors had heard of encryption. I explained to the ladies that encryption means changing a message so that anybody who heard the message would not understand it unless they knew how the message was changed. I used the example of Ig-pay Atin-lay.

  • An-cay ou-yay eak-spay Ig-pay Atin-lay? = Can you speak Pig Latin?
  • I-way ave-hay a-way ecret-say = I have a secret.

 

Then of course I was outsmarted. One of the wNavajo Code Talkers during World War IIomen chimed out, Oh like the Navajo Code Talkers during World War II. (Next time I will start with the smart answer and then go to the Pig-Latin.)  These ladies lived through the shhesh,

So that got me thinking, what does the end-user really need to know about encryption? Sure there are PKI’s, Salted hashes, Block-ciphers, and …. none of which mean anything to the end-user.

What users need to know about encryption

Miguel Leiva-Gomez at MakeTechEasier.com recently explained what beginners need to know about encryption. He says that encryption is a practice in cryptography where a piece of data is obfuscated (manipulated) in a mathematically predictable way. The manipulation makes it very difficult to recover its contents. The author says it is like my pig-Latin example, but much more complex. The mathematical equations used to encrypt (and decrypt/decode) things are called cryptographic algorithms.

These cryptographic algorithms are needed because hackers are getting smarter and sneakier. They’re compromising databases left and right. To protect your data from attacks system owners should use these algorithms to mathematically jumble up all your personal data Jumbling the data (encrypting) making it difficult (if not completely impossible) for a hacker to steal your data from that database. Mr. Gomez claims that encryption basically protects you from intrusion. If a hacker manages to break into a database and take your passwords, it would be reading something like “EAFC49BF4B496090EA2B7CA51674589” instead of “Mary_$mith.”

The article calls the jumbled-up text like “EAFC49BF4B496090EA2B7CA51674589” at the end of every algorithm is called a ciphertext. The decrypted equivalent is known as plaintext. These are very important words to remember when discussing cryptography.

The author explains that there are two ways that the plaintext “Mary_$mith” gets turned into the ciphertext to “EAFC49BF4B496090EA2B7CA51674589” and then back to plaintext “Mary_$mith.” The first method is called a symmetric algorithm:

Symmetric algorithms use a key to Symmetric algorithm:encrypt and decrypt data. The key is basically the “x” that will solve for “y” in the mathematical algorithm. The length of the key and some other properties of the algorithm determine its “difficulty.” The more difficult an algorithm is, the more difficult it is to crack it. A difficult algorithm requires immense amounts of computing power to crack. The kind of horsepower that is usually out of reach from run-of-the-mill hackers. More sophisticated attacks might use computer clusters to decipher your data. Even then, some symmetric algorithms might thwart these attacks.

Asymmetric (public key) algorithms.The second-way plaintext gets turned into the ciphertext and then back to plaintext are called Asymmetric (public key) algorithms. Asymmetric algorithms split the key into two pieces. The first is a public one (usually stored in the server). The second piece is a private one (usually stored in your computer by software). Mr. Gomez writes that asymmetric algorithms get their strength from this particular technique since a hacker will not be able to read the contents of your data even if he gets his hands on the public key (it’s only half the key).

rb-

In the end, no algorithm is created equally. All of them have some flaw or another that will be discovered in the future, so it’s difficult to know what services you should rely on.

The best advice is still the oldest advice. Look for URLs that start with HTTPS and have a little green lock in the URL line. This means some part of the connection is encrypted with Secure Socket Layer (SSL) an Asymmetric (public key) algorithm. The Internet is on the verge of a move to a more secure Asymmetric algorithm called Transport Layer Security (TLS) 

That’s why the age-old advice to keep your PC up to date is critical for keeping your personal data safe.

Related articles
  • Navajo, Pawnee Code Talkers remembered on Veterans Day (KOB.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Working Endless Hours Does Not Make You a Hero

Working Endless Hours Does Not Make You a HeroWorking endless hours may be nothing more than a waste of time. The BYOD and Cloud phenomenons have blurred the line between work and home with the goal of greater productivity. However, data from OECD and the Economist say just the opposite. Entrepreneur reports that Germany has the shortest work week, with employees averaging 35 hours a week at the office, but it also the most productive nation in the world.

According to the cloud-based software company PGi which created this infographic, the marginal benefit of each hour worked on a country’s gross domestic product declines pretty steadily as the number of hours increases.

How many hours a week do you work?

Working Endless Hours Does Not Make You a Hero

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

WWW is 25 Years Old

WWW is 25 Years OldThe world wide web (WWW) turned 25 this year.  The 1989 proposal from Sir Tim Berners-Lee for an “information management” system became the foundation for the World Wide Web. Professor Berners-Lee’s proposal has grown to a worldwide phenomenon  In honor of the milestone, Business Insider provided some insight into how the Internet has grown through the years. Statista made this chart for them using data from Pew. And here is the first U.S. website.

Rapid Rise of the Internet

 rb-

Despite republican political posturing and corporate greed, the Intertubes is 25 years old. It needs our help to keep the internet open for the next 25 years.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.