Tag Archive for EMC

Rockstars Team Up Against Google

Rockstars Team Up Against GoogleTo usurp Mark Twain, the reports of Nortel‘s demise are greatly exaggerated. GigaOm reports that the defunct Canadian telco giant has found an afterlife as part of a patent trolling operation that struck Android phone makers and is now targeting network and cable operators, including Google, with lawsuits in Texas and Delaware.

afterlife of a patent trolling operationJeff John Roberts writes that Nortel’s second act as the walking dead is taking place thanks to “Rockstar Consortium,” a group formed by Microsoft (MSFT), Apple (AAPL), Blackberry (BBRY), Sony (SNE), Ericsson AB (ERIC)EMC (EMC) and other Google (GOOG) rivals, which bought bankrupt Nortel’s patent portfolio in 2011 for $4.5 billion. (rb- I covered the sale of Nortel’s IP here)

Nortel was the source of many of the most important innovations in history in the field of telecommunications and networking,” says a new Rockstar lawsuit filed in the seemingly pro-troll U.S. District Court for the Eastern District of Texas that accuses Time Warner Cable (TWC) of violating six patents, including US Patent 6128649, which was issued in the year 2000 and describes a method to show multiple screens in a video conference the article summarizes.

Rockstar Consortium formed by Microsoft, Apple, Blackberry, Sony, Ericsson, EMC

The complaint doesn’t say how exactly Time Warner Cable is infringing the old Nortel patents, but only notes that “TWC operates, sells and offers to sell video, high-speed data and voice services over its broadband cable systems throughout the United States.” The author says Rockstar, which is suing through a subsidiary called Constellation, also complains that the cable company walked away from its licensing demands in 2012.

GigaOm notes a second lawsuit, filed in Delaware by Rockstar under the alias “Bockstar” makes a series of broad-based allegations against Cisco (CSCO) that claim the company is violating six other old Nortel patents, including this one from 1998, related to routers and switches.

costs are passed on to customersLike all patent trolling, the author says that has nothing to do with innovation, but it certainly will lead to higher cable bills as Time Warner will have to spend millions on lawyers to fight the suit or else pay expensive license fees for old patents from a dead company; either way, the costs are passed on to customers.

Joe Mullin of Ars Technica noted when Rockstar sued the phone companies, “it’s patent trolling gone corporate.” And there’s no sign of where this will stop. Apple and Microsoft are sitting on thousands of patents that date from an era when the Patent Office would grant a patent on nearly anything, and it looks like they’re going to use them to sue every industry they can think of.

dysfunctional US CongressThe totally dysfunctional US Congress tried to take on patent trolling but caved into lobbyists. Microsoft has already succeeded in stripping out a part of the law that would have made it easier to challenge bad patents. This means the best hope for a return to patent sanity may lie with the Supreme Court, which agreed to consider what type of software patents should be granted in the first place.

GigaOm cites CBC reports that Ottawa, Nortel’s hometown has been transformed from a one-time innovation hotbed into a tech necropolis where once-proud engineers are paid to pick apart other people’s inventions in search of new patent violations that they can pass on their American masters.

 rb-

I have covered the patent trolling mayhem in the mobile market for a while and this seems to be more of the same. Innovation is dead in the mobile market and the only way these firms can compete is in the courthouse.

In addition to their choice of venue in the pro-troll Texas court, further evidence that Microsoft and Apple have created a patent troll can be found in the fact that Rockstar has filed suit against the leading Android phone producers:

  1. Samsung Electronics Co. (005930) (#1 Android OEM in U.S. sales),
  2. LG Electronics (LGLD) (#2),
  3. ZTE (763) (#4),
  4. Huawei (002502) (#6) and
  5. HTC (2498) (#7).

In addition, DailyTech notes that Rockstar member Sony is a minor Android OEM.  If somehow Microsoft and Apple are able to troll other Android OEMs to death, Sony could see gains in market share, as the only OEM who doesn’t have to pay direct licensing fees to Microsoft/Apple (Sony also notably has preexisting licensing deals with Microsoft and Apple).

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Disposal Dummies Cause Privacy Problems

The article Disposal Dummies Cause Privacy Problems, posted at  SecureWorld Post by Rebecca Herold lays out the privacy problems caused by dumb disposal policies. The article claims that trash-based breaches are worse than ever.

Disposal Dummies Cause Privacy ProblemsThe oldest security and privacy problem, unsecured disposal of personal information, is prevalent today as it was centuries ago reports the author. She says because of the rapidly growing amount of data, in which EMC (EMC) and IDC claim that data is doubling every two years, along with print information, there are even more ways in which disposal-related breaches are occurring. Here are just a few instances I found:

The blog outlines some of the most common egregious information disposal dummy security and privacy mistakes:

  • DTrash canonating print documents with personal information on them to outside groups, like pre-schools and community groups, to use as scrap paper.
  • Selling computers, smartphones, copiers, fax machines, and other computing devices, to recoup some of the investment, but not irreversibly removing the data before the sale.
  • Putting digital storage devices in the trash without first irreversibly removing the data.
  • Putting print documents containing personal information into unsecured dumpsters, and not shredding them.
  • Never throwing away no-longer-needed hard copy and digital devices; letting them accumulate in storage areas, with inadequate or no security, allowing them to be taken by anyone who happens along.

Data disposal is important because breaches caused by poor disposal activities are getting so bad that the article states there are growing numbers of laws explicitly covering disposal, and bills are being proposed at the state and federal levels. The Disposal Rule (part of the Fair and Accurate Credit Transactions Act of 2003 (FACTA) has been in effect since 2005. The blog says FACTA has many very specific requirements that basically all types of businesses, of all sizes, that do most types of credit checks must take when disposing of information in all forms.

In Michigan, data destruction requirements are covered in IDENTITY THEFT PROTECTION ACT MCL Section 445.72a. where destruction of data containing personal information required; violation as misdemeanor; fine; compliance; “destroy” are defined.

MichiganBesides the fact that secure information disposal is now a legal requirement for most businesses, it makes sense to dispose of information securely to prevent privacy breaches. By having effective disposal policies, procedures and supporting technologies in place businesses demonstrate reasonable due diligence.

Ms. Herold argues that all organizations, from the smallest to the largest, need to follow proper information disposal practices or they will experience significant privacy breaches and non-compliance penalties. She presents an action plan to get started:

  • Assign overall responsibility for information security and privacy compliance to a position or department within your organization, which will include responsibility for the disposal of information in all forms.
  • Perform a disposal risk assessment to find exactly how your organization really disposes of all types of information.
  • Create information disposal policies and procedures, or update existing ones, based upon the results of the disposal risk assessment.

The policies and procedures need actions:

  • Locate, inventory, and gather at the end of their business useFilingcabinetfulness all types of digital storage devices, including CDs, DVDs, USB drives, external drives, tapes (yes, many organizations still use them), microfiche (yes, these too), and any other type of storage media.
  • Inventory all types of computing equipment, including not just the “traditional” computers, but also devices such as printers, fax machines, copiers, smartphones, MP3 devices, and any other types of devices that do computing activities.
  • Define acceptable shredding methods and locations for paper documents. Finely cross-shredding hard copy information is recommended, as well as ensuring any contracted shredding company does such shredding on-site.
  • Define acceptable methods of irreversibly removing data from computing and digital storage devices. Degaussers are still often used, in addition to contracted services to wipe storage devices clean.
  • Make sure you include information backups, and all types of information archives, in your disposal procedures. These items are typically overlooked, and many breaches have resulted from such items.

Data destructionThe bottom line for all organizations, the author argues is: You need to make sure there are proper safeguards for information, computing, and storage devices, during the disposal process.

The author concludes with some recommended resources and articles to aid you with improving your own personal, and organizational, disposal practices:

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

EMC Jumps the Shark

EMC Jumps the SharkIn a pure PR stunt EMC (EMC) has jumped the shark. In a throwback to the 1970s, EMC has released a video of a “Record-Breaking” storage announcement. Motorcycle daredevil (and Evel Knievel wanna-be) Bubba Blackwell attempts to jump his motorcycle over 8 Petabytes of storage in 40 EMC Symmetrix storage units. Data Center Knowledge made a couple of technical observations:

  • Evel Knievel on his Harley-DavidsonParking lots typically don’t make ideal environments for storage gear, especially in a warm climate like Miami.
  • Few data centers possess the perimeter floor space required for a motorcycle daredevil to reach 75 mph.
  • Many data centers lack the ceiling clearance necessary to accommodate a flying motorcycle. The risk of daredevil-duct work collisions would be high.

So don’t try this in your data center!

Will Bubba make it? Click below to find out!

rb-

Yeah I know I got sucked into the EMC marketing machine, but it’s cool.

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

What Is Your Digital Shadow?

What Is Your Digital Shadow?IDC recently released a study, The Diverse and Exploding Digital Universe: An Updated Forecast of Worldwide Information Growth Through 2011“, sponsored by storage vendor EMC. The report updates a similar study conducted in 2007. The report forecasts your digital shadow. Your digital shadow is the amounts and types of digital information in the world. The new IDC 2008 research shows the digital universe is bigger and growing more rapidly than 2007 estimates.

This growth is in part a result of:

  • Growing Internet access in emerging countries,
  • Social networks made up of digital content created by many millions users,
  • Growth in worldwide shipments of digital cameras, digital surveillance cameras, and digital televisions.

According to the study, the digital universe in 2007 was equal to almost 45 gigabytes (GB) of digital information for every person on Earth.

IDC’s research also examines how society and the digital universe interact with each another, how individuals actively contribute to the digital universe – leaving a digital footprint as Internet and social network users, email use, through use of cell phones, digital cameras and credit card transactions. “… we discovered that only about half of your digital footprint is related to your individual actions – taking pictures, sending emails, or making digital voice calls,” said John Gantz, Chief Research Officer and Senior Vice President, IDC.

What is your digital shadow

Enterprise IT organizations that gather the information which makes up digital shadows have a tremendous responsibility – in many cases mandated by law – for the security, privacy protection, reliability and legal compliance of this information According to Joe Tucci, EMC Chairman, President and CEO. “As people’s digital footprints continue growing, so too will the responsibility of organizations for the privacy, protection, availability and reliability of that information. The burden is on IT departments within organizations to address the risks and compliance rules around information misuse, data leakage and safeguarding against security breaches.”

The responsibility for governance of digital information remains primarily on the enterprise. Approximately 70% of the digital universe is created by individuals, yet enterprises are responsible for the security, privacy, reliability, and compliance of 85% of the digital universe.

Additional IDC findings

  • At 281 billion gigabytes (281 exabytes), the digital universe in 2007 was 10% bigger than originally estimated,
  • With a compound annual growth rate of almost 60%, the digital universe is projected to be nearly 1.8 zettabytes (1,800 exabytes) in 2011, a 10-fold increase over the next five years,
  • The information explosion, in raw gigabytes, is predominately visual: images, camcorder clips, digital TV signals, and surveillance streams.

Digital Diversity – Because of the growth of VoIP, sensors, and RFID, the number of electronic information “containers” – files, images, packets, tag contents – is growing 50% faster than the number of gigabytes. The information created in 2011 will be contained in more than 20 quadrillion – 20 million billion – of such containers, a tremendous management challenge for both businesses and consumers.

  • Digital Cameras – In 2007 fewer than 10% of all still images were captured on film.
  • Digital Surveillance – Shipments of networked digital surveillance cameras are doubling every year.
  • A single email with a 1Mb attachment can create over 50 Mb of digital footprint,

EMC also provides a tool to calculate the size of your own digital footprint, download a copy of the Personal Digital Footprint Calculator

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers and anything else that catches his attention since 2005. You can follow him at LinkedInFacebook and Twitter. Email the Bach Seat here.