Tag Archive for 2017

China Trying to Kill Bitcoin

Is China Trying to Kill BitcoinCryptocurrency Bitcoin has been on quite a roller-coaster ride the past weeks. From an all time high of $4,950.72 to $3,537.79 during the first 14 days of September 2017 in four days. That is a loss of nearly $1,413.00 which is over 9 shares of Apple (AAPL) or nearly 19 shares of Microsoft (MSFT). Not only am I skeptical about the value of Bitcoin at these levels, but apparently the Chinese government also is skeptical about cryptocurrencies.

CNET reports that the People’s Bank of China, the central bank of China banned initial coin offerings where bitcoin entrepreneurs and speculators raise funds by launching new digital tokens. ICO’s allowed blockchain startups to raise nearly $2 billion from investors worldwide in 2017. There was no mention of cryptocurrencies such as Bitcoin or its rival Ethereum, but the announcement sent stocks sliding anyway.

CNET says PBC ruled that ICOs are a form of “unauthorized and illegal public financing … (which) seriously disrupted economic and financial order” in China. To that end, the country has banned all sales and currency conversions involving digital tokens, and prohibited all financial institutions and non-bank payment organizations from offering any services to ICOs.

Chinese government may be trying to kill BitcoinThe American Banker speculates that the Chinese government may be trying to kill Bitcoin. In a recent article they lay out the case for Chinese regulators putting an end to cybercurrencies.

They point out that the Communist government of China is known for its strict capital controls and sweeping regulatory judgments. This attitude has spilled over to its relationship with cryptocurrencies.

Some observers are quick to point out that China has a long history of using the “Great Firewall of China” to block Western web sites, from Facebook to YouTube to WhatsApp and even VPN’s.

According to AB, the Chinese regulators have instructed all domestic cryptocurrency exchanges to shut down this month, effectively choking off one of the largest markets for the commercial buying and selling of bitcoin and other digital assets.

Further, cryptocurrency exchanges in China must work closely with authorities as they wind down their operations. AB says four major Chinese exchanges—Huobi, ViaBTC, OKCoin and BTC China, at one time the world’s largest by trading volume—have already announced their shutdown.

The moment could be a pivotal one in the evolution of financial services. It could easily be misread both by traditional bankers who could be disrupted and fintech entertainers who see a profit in disrupting the status quo. Bitcoin skeptics such as JPMorgan Chase’s CEO Jamie Dimon who called bitcoin a “fraud” that would soon “blow up.” American Banker believes Mr. Dimon has grown annoyed at the cryptocurrency’s staying power even though his firm is experimenting with blockchain technology—and filed a patent in late 2013 for a bitcoin-style digital payment system.

Next on the chopping block could be bitcoin miners. Bitcoin miners use tremendous amounts of computing power to verify and record transactions on the bitcoin network. In return, they receive new bitcoins which are minted at a predetermined rate. Some 80% of the world’s bitcoin mining takes place in China, the article claims the bottom could fall out of the business if miners have no way to turn their digital gains into fiat currency.

China is doing this “just to show their power,” Oleg Seydak, CEO of the marketplace lender Blackmoon Financial told AB. “They will temporarily close these companies, introduce strong regulations and keep the industry and the sector under their control.”

This approach makes sense if Chinese leaders do not want to be seen as falling behind in a new and growing market. In 2016, China accounted for the majority of global bitcoin trading activity. But with the government clamping down, China’s share has dropped to less than 15% of global volume. Japan now holds the top spot, with the  U.S. and South Korea close behind.

Sasha Ivanov, CEO of Waves, a blockchain platform believes the Chinese ICO ban is a positive development for the industry. Mr. Ivanov told AB that most ICOs were nothing but scams. He says Chinese regulators “finally lost patience, as more and more companies tried to raise millions for nothing.” China, he said, “has a reputation of being a harsh regulator that makes abrupt decisions,” but he feels confident that ICOs will be allowed by Chinese authorities once they have put in place an adequate regulatory framework.

the party's all about control“Fundamentally it all comes back to control, and right now the party’s all about control, especially around the 19th” Communist Party Congress, Bill Bishop, head of The Sinocism China Newsletter told CNBC.

Paul Triolo, practice head, geo-technology, at Eurasia Group, told CNBC, “the cyrptocurrency problem has gotten exponentially more difficult for them to get their head around and regulate.”

“Definitely bitcoin and cryptocurrencies’ free [reign] is over. But the issue of how this will affect the blockchain industry is still unknown,” Mr. Triolo said. “China doesn’t want to be left out of that. They’ll probably still end up allowing some parts of blockchain to survive. The financial piece of bitcoin and the blockchain industry is what they’re after.”

rb-

Seems to me that China wants to reign in cryptocurrencies rather than kill them off. The free-wheeling de-centralized nature of bitcoin makes the centrally controlled Chinese beureartes nervous. However they will probably adapt bitoin to meet their internal needs which is counter to the stated goals of bitcoin.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers and anything else that catches his attention since 2005. You can follow him at LinkedInFacebook and Twitter. Email the Bach Seat here.

Guestimating for Project Managers

Guestimating for Project ManagersSince the dawn of time, one of the questions most likely to strike fear into the heart of even seasoned project managers is, “So how much is this project going to cost?” In fact, at Brightwork says there are hieroglyphs on the wall of the tomb of the great pharaoh Khufu, depicting the pharaoh asking Vizier Hermiunu, the pyramid’s project manager, this very question about his burial pyramid and, a few walls down, a second depiction of the project manager being thrown into a nest of crocodiles in the Nile after the project overran its budget by a few thousand debens.

As evidence of how little project management progressed, Mr. Kreha relates how he sat in a questioning-techniques-in-training estimation meeting and watched an agile” project team assign “points” to “stories” in a vain attempt to estimate how much work they might get done in the next two weeks, aka the next sprint. And inevitably, a new team member would ask at some point, “so how many hours are there in a point?” Immediately, this agile novice is mocked mercilessly! “You don’t understand,” the scrum master and other developers say, “points aren’t convertible into hours or dollars. We use a Fibonacci sequence – you know, 1,2,3, 5, 8, and 13 – to estimate how much effort a story is. It has nothing to do with hours or money.”

And so we project managers are still left holding the bag for estimating projects, often early in a project’s lifecycle, and then being held accountable for them as if we were clairvoyant. What can be done?

Brightwork’s Kreha offers some hints on how to stay out of the croc pond. Start doing them, that might help:

Separate hard costs from soft costs

Separate ‘hard costs’ from soft costsWhen you’re estimating. Hard costs are things like license fees. Once you have a quote from a vendor (stall until you have one) you can be pretty confident that’s what the cost will be. Hourly labor, and time and material contracts in general, are obviously softer since you’re funding time and not deliverables per se.

For softer costs, use burn rates’ to look at low, likely, and high ranges for labor costs. For example, if you have a team of 10 with an average bill rate of $100/hour and they will be working on your project more or less full time for the next 5-6 months, you’re looking at $860k to $1M if I did the math right. Don’t get suckered into estimating hours without thinking about time, because things ALMOST ALWAYS take longer than you planned.

Use ranges wherever possible

use ‘burn rates’Early in a project, it at least helps to subliminally communicate to stakeholders that the project costs are still a bit squishy. I am sure we’ve all seen estimates that have line items down to the dollar. Like $365,750.00. That’s a terrible thing to do – it implies a precision that just isn’t there.

Don’t EVER leave out contingency! At the project outset, make sure it’s 25% of the total project estimate. And try your best NOT to tell anyone it’s there. That’s YOUR insurance policy to keep you out of the croc pond

Get estimates from multiple sources if possible. Have a technical team do an estimate. Have a trusted project manager do one. And maybe even ask the stakeholders what they think the project should If the numbers you get back are wildly variant, you have a lot of work to do to rationalize them down to something plausible.

BiddersRelentlessly track your actual costs as you incur them! And more importantly, once you see them drifting away from the estimate or any underlying assumptions you made, TELL someone right away. Delivering financial bad news is one thing; delivering financial bad news 75% through a project is PM malpractice.

Figure out who, if anyone, is likely to be joining you in the croc pool. Trust their numbers more than someone who will skate out the side door faster than Usain Bolt if the project costs start going sideways.

rb-

We have all been there, in the croc pond, under the bus, or in front of the train. Someone didn’t complete their task on time or misunderstood a requirement or just screwed up. These suggestions can help insulate you from some of the inevitable problems that are part of being a project manager.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Your Brain Craves Coffee

Why Your Brain Craves CoffeeFor a long time, the man has held us down. They used their science and medicine to tell is that a cup or two cups of coffee, or more accurately the caffeine in coffee, was bad. Times they are a-changing we no longer have to justify drinking coffee to anybody. At the Bach Seat, we celebrate coffee. Recent research carried out by many free-thinking independent medical professionals from universities and health care institutes have shown that actually, caffeine has many benefits to our bodies and minds.

Freddie Mercury drinking coffee

The caffeine present in our daily coffee can help us to live longer, have more mental ability, and focus. Coffee can fight depression and even help us to lose weight. What’s not to love about the nation’s favorite drink?

Fed up of justifying your coffee freedom to the man? This infographic from Dripped Coffee gives us 13 reasons why our brains carve coffee.

Dripped Coffee - 13 Reasons Why Your Brain Craves Coffee

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Don’t Know Much Security

Don’t Know Much SecurityWith apologies to Otis Redding, Americans don’t know much about security. They don’t know much privacy or the SPAM they took. A new Pew Research Center survey, “What the Public Knows About Cybersecurity” quizzed 1,055 adults about their understanding of concepts important to online safety and privacy. The results of the Pew survey are unsettling.

questions about cybersecurityThe Pew Research survey asked 13 questions about cybersecurity. The median score was five correct answers. Just 20% answered eight questions correctly. A relatively large percentage of respondents answered “not sure” to questions rather than providing the wrong answer.

Most Americans don’t know how to protect themselves. Only 10% were able to identify one example of multi-factor authentication when presented with four images of online log-in screens.

Most Americans still unknowingly allow themselves to be tracked across the web. 61% of those surveyed were not aware that Internet Service Providers can still see the websites their customer visit even when they’re using “private browsing” on their search engines.

A slight majority (52%) of people recognized that just turning off the GPS function on smartphones does not prevent all tracking of the phone’s location. Mobile phones can be tracked via cell towers or Wi-Fi networks.

Only 54% of respondents correctly identified a phishing attack. For cybercriminals, phishing remains a favorite trick for infecting computers with malware. Phishing schemes usually involve an email that directs users to click on a link to an infected website.

phishing attackComputer security software does a good job of blocking most phishing schemes, Stephen Cobb, security researcher for anti-virus software firm ESET told Phys.org, including many advanced spear-phishing attacks targeting people with personalized information.

Retired Rear Adm. Ken Slaght, head of the San Diego Cyber Center of Excellence, a trade group for the region’s cybersecurity industry told KnowB4.

It is probably our No. 1 concern and No. 1 vulnerability … These attackers keep upping their game. It has gone well beyond the jumbled, everything misspelled email.

2/3’s of Americans tested, could not identify what the what the ‘s’ in ‘https‘ meant. The article explains that the ‘s’ stands for secure, with website authentication and encryption of digital traffic. It is used mostly for online payments. Security researchers often suggest computer users check the website addresses – known as the URL – as a first step before they click on a link. ESET’s Cobb said, “You wonder if people know what a URL is … Do they know how to read a URL? So there is plenty of work to be done.”

In the most puzzling finding to me, 75% of participants identified the most secure password from a list of four options. And yet followers of Bach Seat know that year after year passwords suck. Could it be that Americans just don’t care about online security?

Fortunately, some Americans also recognize that public Wi-Fi hotspots aren’t necessarily safe for online banking or e-commerce. The mixed security results highlight that staying secure online is not a priority for Americans at work or at home.

The Wall Street Journal also covered the Pew findings and quoted Forrester: “The percentage of security and risk professionals citing “security awareness” as a top priority rose to 61% last year, from 56% in 2010.”

In the enterprise, Heidi Shey, a senior analyst at Forrester, told CIO Journal that security awareness training isn’t always effective, since it’s often conducted once a year as a compliance issue and involves lists of dos and don’ts.

The human element is important in safeguarding a firm against cyberattack, since it’s both a first line of defense as well as a weak link. Successful awareness efforts are focused on enabling behavioral change, and typically customized and specific to an organization, its workforce, and relevant risks.

rb-

The data from Pew says that enterprise and home users need to be more security-aware. Technology can’t solve stupid so users have to be the last line of defense.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Whats Up With Cisco?

Whats Up With Cisco?What is up with Cisco? Their fiscal results for 2017 Q3 showed revenue of $11.9 billion, a 1% decline in revenue, compared to last year. This is the 6th consecutive down quarter. The networking goliath also issued downward guidance for 2017 Q4. They estimated a revenue declines of 4-6% year-over-year.

Cisco logoOn the earnings call, Cisco CEO Chuck Robbins blamed several factors for the lower guidance. He cited:

  • “A pretty significant stall right now” in the U.S. federal public sector.
  • Service provider revenues were down in Mexico.
  • United Kingdom business is being dampened by currency issues.
  • Middle East, there is “pressure… relative to oil prices.”

Cisco layoffs

Then there are the layoffs. Cisco buried the announcement in a footnote in the company’s SEC 8-K report that 1,100 more layoffs are coming. That is on top of the 5,500 announced in August 2016.

In May 2017, we extended the restructuring plan to include an additional 1,100 employees with $150 million of estimated additional pretax charges.

Cisco layoffs

According to SDXCentral, the Cisco CEO stressed several times on the earnings call, that the company is transitioning to more software and subscription-based business. He declared,

I am pleased with the progress we are making on the multi-year transformation of our business.

These weak financial results and the move to a subscription-based business have fed speculation about the future Cisco business model. TechTarget speculates that Cisco may go so far as to separate the Network Operating System (NOS) from the hardware. They contend the move would be a dramatic departure from Cisco’s traditional business model of bundling high-margin hardware with its NOS. The author believes that market trends will likely force the vendor to release an open NOS.

Open NOS

Cisco 3750 switchTechTarget cites reports from The Information that a hardware-independent NOS called Lindt is coming. Reportedly Lindt will run on a white box powered by merchant silicon. According to the article, a number of market trends are driving the move to a hardware-independent NOS.

The first market trend forcing Cisco’s hand is the company’s declining dominance of the Ethernet switch market. Since 2011, the company’s share has dropped from 75% to less than 60% last year, according to the financial research site Trefis. The decline is important to Cisco’s bottom line. Switches accounted for 40% of Cisco’s product sales in 2016, 30% of net revenues, and 20% of the company’s $162 billion valuation.

Infrastructure as a ServiceCisco’s weakening performance in switching is tied to the second market trend forcing Cisco to release a hardware-independent NOS. Its customers are turning to public cloud providers, Amazon (AMZN) Web Services, Microsoft (MSFT) Azure, and IBM (IBM) SoftLayer, for their IT infrastructure. The more enterprises subscribe to infrastructure as a service, the less networking gear they need in their data centers.

Cloud computing

The shift to cloud providers is found in the latest numbers from Synergy Research Group. Revenue from public cloud infrastructure services is growing at almost 50% a year. In the fourth quarter of last year, revenues topped $7 billion.

 cloud providers are building open networking hardware and softwareThe third market trend forcing Cisco to a hardware-independent NOS is enterprises that were Cisco’s largest customers are now competitors. Enterprises and cloud providers are building open networking hardware and software to replace inflexible proprietary systems that lock them in. Those companies include large financial institutions, like Bank of America, Goldman Sachs, and Fidelity Investments. As well as communication service providers, AT&T (T), Deutsche Telekom, and Verizon (VZ).

The technology shift is driving an enormous amount of spending on IT infrastructure. Worldwide spending on public and private cloud environments will increase 15% this year from 2016 to $42 billion, according to IDC. Meanwhile, spending in Cisco’s core market of traditional infrastructure for non-cloud data centers will fall by 5%.

White boxes

Arista NetworksWhile Cisco is ignoring the trend away from proprietary hardware, the article says Cisco’s rivals are embracing it. Juniper (JNPR) and Arista (ANET) have released versions of their NOS for white boxes favored by cloud providers and large enterprises. Both companies reported year-to-year revenue growth in switching last year. Even Cisco’s patent lawsuit against upstart Arista was set back by the courts.

Rohit Mehra, an analyst at IDC hypothesized that Cisco’s resistance to change is likely due to fear that giving customers other hardware options would accelerate declining sales in switching. “There would be potentially some risk of cannibalization in the enterprise space,” he added.

Cisco insists its customers are not interested in buying networking software that’s separate from the underlying switch. The Cisco spokesperson told TechTarget:

TCisco insists its customers are not interestedhe vast majority of our customers see tremendous value in the power and efficiency of Cisco’s integrated network platforms, and the tight integration of hardware and software will continue to be the basis of the networking solutions we offer our customers

TechTarget adds that Cisco doesn’t say the article is wrong. Instead, the company falls back on a corporate cliché for refusing to discuss a media report. “We don’t comment on rumor or speculation,” a Cisco spokesperson said.

The networking market is evolving away from the hardware that Cisco depends on for much of its valuation. Cisco will resist changing its market approach for as long as possible. But in the end, the company will have to become a part of the trend with an open NOS capable of running on whatever hardware the customer chooses.

Cisco’s own problems

Rather than change its model for selling networking gear, Cisco has spent billions of dollars on acquisitions over the last few years to create software and subscription-based businesses in security and analytics. But Cisco’s software push has yet to pay off with 5 conservative down quarters.

Finally, Cisco just recently patched a flaw in IOS software that affected more than 300 models of its switches. Despite issuing an advisory on March 17, Cisco did not release the patch for this vulnerability until May 8, 2017. The Cisco vulnerability was part of the Vault 7 WikiLeaks dump of alleged CIA hacking tools.

Alleged CIA hacking toolsThe vulnerability, rated a critical 9.8 out of 10 by the Common Vulnerability Scoring System, is in the Cluster Management Protocol, or CMP. could allow a remote, unauthenticated attacker to reload devices or execute code with elevated privileges. This vulnerability can be exploited during Telnet session negotiation over either IPv4 or IPv6.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.