Tag Archive for 2019

The Internet is 50

In 1969 Apollo 11 took man to the moon, Woodstock rocked, Sesame Street debuted, Wendy’s was founded and the Internet was born and crashed. On October 29, 1969, at 10:30 pm Pacific Time. The first use of the proto-Internet was attempted by UCLA student programmer Charley Kline. He was trying to log in to a system at Stanford.

proto-Intenet userOnly 2 characters were sent before the entire fledgling Internet crashed. About an hour later, after debugging a code translation problem caused by the UCLA computer using EBCDIC (Extended Binary Coded Decimal Interchange Code) and the SRI computer using ASCII (American Standard Code for Information Interchange), the first actual remote connection between two computers was established over what would someday evolve into the modern Internet.

ARPANET

The proto-Intenet was funded by the Advanced Research Projects Agency (the predecessor of DARPA). It is commonly believed that ARPANET was built to explore technologies related to building a military command-and-control network that could survive a nuclear attack. However, Charles Herzfeld, the ARPA director who would oversee most of the initial work to build ARPANET told ars Technica:

ARPANET was not started to create a Command and Control System that would survive a nuclear attack  … clearly, a major military need, but it was not ARPA’s mission to do this … ARPANET came out of our frustration that there were only a limited number of large, powerful research computers in the country, and that many research investigators … were geographically separated from them.

Oringal Internet 1969In its infancy, ARPANET had only four “nodes”:

Internet routers

Rather than being directly connected, physicist Wesley Clark suggested the mainframe computers connect to ARPNET via another device to off-load the connections. These devices were called Interface Message Processors (IMPs). IMP’s were the first network routers and built by BBN which used Honeywell DDP-516 mini-computers with 12K of memory. The early-ARPANET connected the nodes with AT&T 50kbps lines. This would allow additional systems to be added as nodes to the network at each site as it evolved and grew.

Some of the major innovations that occurred on ARPANET include;

  • Email (1971),
  • Telnet (1972)
  • File transfer protocol (1973).
As ARPANET grew interoperability grew as an issue. The solution proposed by Vinton Cerf and Bob Kahn in 1982 was TCP/IP. The evolution of TCP/IP allowed organizations of all sizes to began using Local Area Networks or LANs. A standard network protocol like TCP/IP then allowed one LAN to connect with other LANs.
ARPANET was operated by the military until 1990, and until then, using the network for anything other than government-related business and research was illegal. TCP/IP made it possible for anyone to get on ARPANET. As non-military uses for the network increased, it was no longer safe for military purposes. As a result, MILnet, a military only network, was started in 1983.ARPANET logical diagram 1977

NSFnet

NSFnet logoARPANET was slowly replaced by NSFnet (National Science Foundation Network) beginning in 1986. NSFnet first linked together with the five national supercomputer centers, then every major university. ARPANET was finally shut down in 1990. NSFnet formed the backbone of what we call the Internet today.

When ARPANET was shut down, Vinton Cerf, one of the fathers of the modern Internet, wrote a poem in ARPANET’s honor:

It was the first, and being first, was best,
but now we lay it down to ever rest.
Now pause with me a moment, shed some tears.
For auld lang syne, for love, for years and years
of faithful service, duty done, I weep.
Lay down thy packet, now, O friend, and sleep.

rb-

Len Kleinrock, a UCLA professor since 1963 who was present at the birth of the Internet, described the attitude of the early Internet for NBC News, “Allow that open access, and a thousand flowers bloom … One thing about the Internet you can predict is you will be surprised by applications you did not expect.”

That openness of the early Internet has given way to growing concern that the Internet has become centralized by a few major companies, compromised by governments, and monetized by the collecting and sharing of private data.

ars Technica notes that the first three characters ever transmitted over the precursor to the Internet were L, O, and L. Without ARPANET, there would have been no Internet.

The Internet is still laughing out loud at us.

Related Posts

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Why Don’t Users Protect Themselves

Why Don't Users Protect ThemselvesA new report (PDF) from recently swallowed and swallowed again Webroot, says that American technology users overestimate their levels of cyber hygiene. Cyber hygiene is a cybersecurity risk mitigation technique introduced by Vinton Cerf in 2000 where you train yourself to think proactively about your cybersecurity. The goal is to resist cyber threats and online security issues to protect and maintain IT systems and devices and implement cybersecurity best practices, just as you do with your daily personal hygiene.

Webroot logoThe report says U.S. users do not know how to protect themselves from cyber threats. Americans are overconfident in the perceived protection they have. The endpoint security and threat intelligence provider found that 88% of interviewed Americans believe they are taking the appropriate steps to protect themselves from cyber-attacks.

Their confidence is misplaced. Instead, Americans have only a surface-level understanding of the most common types of cyber threats according to Webroot. We can recognize some of the names of the most common cyber-attacks such as malware (79%) or phishing (70%), but for most, that’s where their knowledge ends. Very few (less than 1 in 3) actually know what these common cyber-attacks are or what they do.

While Americans claim to have heard of some of the most common cyber-attack terms when prompted, very few actually understand what those cyber-attacks are. When asked about critical cyber-hygiene issues like malware, backups passwords, and identity theft surveyed Americans reported:

20% update their AV software regularlyMalware – 79% have heard of malware, but only 28% can confidently explain what it is. 82% are using some sort of AV software on their personal devices. 62% of those who use AV software use a free product. Only 20% update their AV software each time they are prompted.

Backups – are another weakness. 78% of respondents report backing up their data. However, 57% are still leaving themselves susceptible to risk by only backing up using one method, rather than backing up online (cloud) and offline.

  • 22% rarely or never backup their data.34% Automatically backup to the cloud
  • 27% Backup to an external hard drive
  • 24% Backup to a USB stick
  • 22$ backup locally on My Computer
  • 17% backup manually to the cloud
  • 22% rarely or never back up their data.

Among those who are backing up their information by uploading it to the cloud, only 43% are taking the extra step in ensuring that it’s stored in an encrypted format.

33% of Americans admit to sharing their passwordsPasswords – Followers of Bach Seat know that passwords suck and the Webroot report confirms it. 33% of Americans admit to sharing their passwords with others. To make matters worse, 63% are reusing passwords across multiple accounts. The research found that Americans have on average 9 passwords for 17 accounts.

Mobile – While on the go, 67% of Americans use public Wi-Fi, but only 35% take the extra step to protect themselves by using a VPN. Additionally, 34% use a work device as their primary personal device at home.

Identity theft 74% of Americans believe their identity stolen has never been stolen.

According to the Webroot whitepaper, the 5 most cyber risky U.S. states are:

  1. Mississippi most cyber risky stateMississippi
  2. Louisiana
  3. California
  4. Alaska
  5. Connecticut

The 5 least risky U.S. states are

  1. New Hampshire least cyber risky stateNew Hampshire
  2. North Dakota
  3. Ohio
  4. Idaho
  5. Kentucky

rb-

According to the research conducted by Wakefield for Webroot, Michigan ranked 31 among the 50 states. Overall, the average home user scored a 60% for cyber-hygiene. The researchers also found that those who they classified as “Superstars” tended to be:

  • A Boomer
  • Married or in a relationship
  • Suburbanite
  • Not a parent.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Xerox May Buy HP

Updated 02/27/2020 HP has returned fire on the heels of beating Wall Street expectations for ‘Q1 20. HP announced a “value creation plan” to return $16 billion to shareholders to fight the hostile takeover bid from Xerox. This will come in the form of HP stock buybacks and dividends powered in part by cost-cutting.

But Xerox has not backed down and plans to launch a tender offer starting “on or around” March 2, which will ask all HP shareholders to sell their shares to Xerox.

There is now speculation that HP could buy out Xerox.

Updated 02/10/2020 Xerox has fired another salvo in its hostile take-over attempt of HP. CNBC is reporting that Xerox has boosted its offer for HP Inc. to $34 billion (from $22 to $24 a share). A billion here, a billion there, and pretty soon you’re talking about real money.

___

Updated 01/24/2020 – “People familiar with the matter” are saying the HP share-holder Xerox plans to nominate up to 11 people to the 12-person HP Inc. board of directors as the next step in its hostile takeover bid of HP, 2019’s global PC sales leader.

In response, HP publicly called out billionaire activist shareholder Carl Icahn. In a presser, HP claimed Mr. Icahn’s interests were not aligned with those of other HP shareholders.“Due to Mr. Icahn’s ownership position, he would disproportionately benefit from an acquisition of HP by Xerox at a price that undervalues HP.” Mr. Icahn owns about 11% of Xerox and a representative for Icahn wasn’t immediately available for comment to Yahoo.

Updated 12/10/2019 – And the story goes on – Xerox CEO John Visentin is meeting with some HP shareholders to walk them through the key points of the proposed acquisition. In what it describes as “undisputed” logic. ZDNet has some of the slides.

___

Updated 11/25/2019 – This morning, HP rejected Xerox’s follow-up demand to either agree to formal merger talks otherwise, Xerox would present a “compelling case” for a buy-out directly to HP shareholders. Seems a proxy fight is brewing with activist contrarian investor Carl Icahn holding shares on both sides of the deal.

___

Updated 11/17/2019 –  HP’s Board of Directors has unanimously rejected Xerox’s bid to acquire HP. But, HP did not completely shut down Xerox’s efforts to merge the two aging tech giants.

___

Xerox May Buy HPHP inc. could be bought out on the heels of its second round of layoffs in 15 months. According to reports, Xerox (XRX) sent a buyout proposal to HP Inc. on November 5. The PC giant confirmed the offer on 11/06/2019. HP issued a vague statement that reads in part;

Xerox logo… we have had conversations with Xerox Holdings Corporation (XRX) from time to time about a potential business combination. … We have a record of taking action if there is a better path forward and will continue to act with deliberation, discipline, and an eye towards what is in the best interest of all our shareholders.

The ambiguous HP (HPQ) statement may be a ploy to bring additional bidders to the negotiating table. Norwalk, CT-based Xerox is reportedly backed by Citigroup Inc. CRN reports that Xerox is set to gain $2.3 billion by selling its 25% stake in the Fujifilm Xerox joint venture.

HP logoBloomberg claims that remaining independent is only going to become more difficult for both HP and Xerox. Gartner predicts that global printer shipments set to decline by 2% annually through 2023. Teaming up would reduce costs and competition in the segments where they overlap; HP is generally stronger in the market for smaller printers, while Xerox holds the lead in larger ones. That could boost profitability even as revenue stagnates.

A Xerox-HP merger would result in significant job reductions around the world as the new company would seek to cut costs through the elimination of back-end costs associated with supply chain, finance, HR, and other OPEX expenses. The impact on the two companies’ respective channels would be most felt in the printer segment, where there’s the greatest overlap. Another likely outcome is the spin-off of HP’s 3D printing division, which is not core to either of the companies.

So how did we get here? Xerox is still finding its way after splitting from its professional services business in 2016, which formed the new business Conduent, and the failed merger with FujiFilm in 2018. Xerox relies on a dying business for the bulk of its sales and profit. It sells and services copy machines and printers, primarily for corporations. But sales are falling, declining for the past seven quarters.

HP announced plans to reduce headcount by as much as 9,000, or 16% of its 55,000 employees. The staff reductions, through layoffs and voluntary early retirement, are expected to be completed by the fiscal year 2022. In June 2018, the company laid off 5,000 employees over several months.

HP's struggles in the printer and printer supplies businessWhile HP appears to be holding its own in the PC space — both Gartner and IDC place HP Inc. in second place behind Lenovo for unit shipments as of this 2019 Q2. HP’s ongoing struggles in the printer and printer supplies business, where HP has long been the market leader, has been under stress from third-party suppliers selling toner and ink at significantly lower prices. Reports are that HP’s printer business accounts for a whopping 75% of its total profits and roughly half of its total revenues.

Xerox started in 1906 as the Haloid Photographic Co. The photographic supply company in Rochester, NY, paved its way to mega-success in March 1960, when it shipped its first office copier. The Haloid Xerox contraption was the size of two washing machines and weighed 648 pounds. It also occasionally caught on fire. The Xerox copier’s core technology -— a process called xerography, invented by Chester Carlson — is still widely used in copy machines five decades later.

HP traces its origins to 1938 when Bill Hewlett and Dave Packard rented a garage in Palo Alto, CA. That year, they invented their first product: the HP Model 200A, an audio oscillator used to test sound equipment. The company became the pioneer of Silicon Valley, building its first computer in 1966 and the famous HP-35 in 1972 — the world’s first hand-held scientific calculator. Hewlett-Packard, split into two companies in 2014. HP Inc. got printers and PCs. HP Enterprise got servers and enterprise software.

rb-
Marketwatch has some good data on why these firms are planning to hook up. They write that globally consumers will print 210 billion pages, down 20% from 2015. In 2018, U.S. consumers printed an average of 38.4 pages a month, down 40 pages per month in 2017. In addition to printing less, U.S. consumers have purchased 11% fewer inkjet printers so far in 2019.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Celebrities You Shouldn’t Google in 2019

Celebrities You Shouldn't Google in 2019It is time once again for McAfee’s annual search for the most dangerous celebrity online. The 2019 version of the cyber-security firm’s research found which celebrities’ internet searches expose users to the most risk from malicious websites, malware, and ransomware, and other risky outcomes. McAfee says that criminals use deceptive websites to dupe unsuspecting consumers into accessing malicious files or content.

McAfee logoMcAfee crowned actress Alexis Bledel the riskiest celeb online for 2019. Searches for the actress, known for her role as Rory Gilmore. in the TV show Gilmore Girls landed the most users on risky websites that carry viruses or malware in 2019.

McAfee speculates that the Texas-born Bledel’s role as Ofglen in the fan-favorite Hulu series “The Handmaid’s Tale” and big-screen role in the “Sisterhood of the Traveling Pants” movies led to her top ranking.

Alexis Bledel is McAfees 2019 riskiest celeb onlineThe actress takes over the number one spot from Ruby Rose, who topped last year’s list mainly because of fans’ interest in her playing Batwoman.

The second most dangerous celebrity online was British comedian and actor and host of the Late Late Night show, James Corden. The popularity of viral videos from the Late Late Show gives attackers more options to spread their malware.

Sophie Turner made the list at number 3. She has been trending lately due to her role on “Game of Thrones,” as well as her relationship with singer Joe Jonas.

Lupita Nyong'o is McAfees 5th riskiest celeb onlinePitch Perfect series’ actress Anna Kendrick reached 4th place.  She was followed by Lupita Nyong’o as the 5th riskiest position on the risky celebrity list. McAfee speculates that interest in “Star Wars: The Rise of Skywalker” put Ms. Nyong’o on the list.

Comedian, former SNL star, and current Tonight Show host Jimmy Fallon is ranked number 6. Viral videos from Tonight Show are popular with threat actors.

Martial arts master Jackie Chan, who came in at 7. McAfee  explained that rumors circulated about his return to the big screen in “Rush Hour 4” and “The Karate Kid 2.” His team denied the gossip, but cyber-criminals took advantage of fans’ nostalgia to spread their malware.

Rappers take the #8 and 9 positions on McAfee’s list. Lil Wayne was named the eighth most dangerous driven by his summer tour with Blink-182  and fans search for illegal downloads. Nicki Minaj came in at 9. She caused many of her fans to panic in September after she tweeted she was retiring from music and attackers took advantage of her fans’ quest for more information by poisoning her searches.

Tessa Thompson is McAfees 10th riskiest celeb onlineTessa Thompson, known for her role as ValkyrieMarvel’s first LGBTQ superhero, was listed as the number 10 riskiest popular search term this year thanks to her leading roles in “Men in Black: International” and “Avengers: Endgame.”

Cyber-criminals also use the same celebrity-baiting tactics internationally. According to McAfee, the most dangerous online celebs around the world are:

Gary Davis, chief consumer security evangelist at McAfee explained the risks involved with searches for these celebrities.

Camila Cabello is McAfees riskiest celeb online in SpainConsumers may not be fully aware that the searches they conduct pose risk, nor may they understand the detrimental effects that can occur when personal information is compromised in exchange for access to their favorite celebrities, movies, TV shows, or music

He warns celebrity seekers to be cautious.

It is essential that consumers learn to protect their digital lives from lurking cyber-criminals by thinking twice before they click on suspicious links or download content.

rb-

Cord-cutting could be driving some of this risky behavior. McAfee found that the names of the risky celebs like Bledel, Fallon, and Chan are strongly associated with searches including the term “torrent.”

These users are bypassing the subscription services like Hulu and Amazon to save a few bucks put their digital lives at risk in exchange for pirated content.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Halloween 2019

NASA’s Hubble space telescope has discovered this haunting specter with glowing eyes glaring at us from deep space for Halloween.

Halloween 2019

 

Space.com explains that the halloween visitor is. The piercing “eyes” of this creepy space face are two distant galaxies in the middle of a head-on collision. A ring of young blue stars contours the shape of the eerie face. The dense clumps of stars have come together to form its nose and mouth.

This galaxy merger is known as Arp-Madore 2026-424. The designation combines the names of the two astronomers that first documented it. Arp-Madore 2026-424 is about 704 million light-years away from Earth in the constellation Microscopium.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.