Tag Archive for GOOG

It’s Official: Google is Better Than Us

It's Official: Google is Better Than UsBusnessInsdier’s Matt Rosoff reports that Google (GOOG) Executive Chairman Eric Schmidt says that people in Silicon Valley don’t talk about the concerns of the 99% because a lot of them are immune to those concerns.

It's Official: GOOG Better Than UsCEO Schmidt told Brad Stone at BusinessWeek, “Occupy Wall Street isn’t really something that comes up in daily discussion because their issues are not our daily reality.

He also said “We live in a bubble, and I don’t mean a tech bubble or a valuation bubble. I mean a bubble as in our own little world….

rb-

Maybe GOOG should think about how statements like this look to the 99%.

Do you think Google is concerned about what the public thinks?

View Results

Loading ... Loading ...

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Data Centers To Go Wireless

Data Centers To Go Wireless

MIT’s Technology Review reports researchers from IBM (IBM), Intel (INTC), and the University of California, Santa Barbara have come up with a way to improve data transmission in data centers. Heather Zheng, associate professor of computer science at UCSB who led the research says wireless is the answer to the in-rack cabling mess usually found in data centers. In their paper (PDF), the researchers say that transmitting data wirelessly within a data center would be simpler than rewiring data for tech titans like Google (GOOG), Facebook, or Twitter.

Line-of-sight connections

WiFi radio wavesThe earlier challenge for multi-gigabit wireless in the data center was it required a line-of-sight connection to be useful. Achieving the required data center speed could not happen in the maze of metal racks, HVAC ducts, and electrical conduits that make up most data centers.

TR reports that the researcher’s solution is to bounce 60-gigahertz Wi-Fi signals off the ceiling, which could boost data transmission speeds by 30 percent. Stacey Higginbotham at GigaOm points out that this could result in data transfers up to 500 Gigabits per second. She says current Ethernet cables in data centers are generally 1, 10, or maybe 40 gigabits per second.

60-gigahertz Wi-Fi for servers

Data center ceiling WiFiMs. Zheng and colleagues used 60-gigahertz Wi-Fi, which has a bandwidth in the gigabits-per-second range and was developed for high-definition wireless communications according to TR. However, it has its limitations, says Ms. Zheng. To maximize the bandwidth and reduce interference between signals, it needs to use 3D beamforming to focus the beams in a direct line of sight between endpoints. “Any obstacle larger than 2.5 millimeters can block the signal,” she says in the TR article.

One way to prevent the antennas from blocking each other would be to allow them to communicate only with their immediate neighbors, creating a type of mesh network. But that would further complicate efforts to route the data to the proper destinations, Professor Zheng told TR. Bouncing the beams off the ceiling directly to their targets not only ensures direct point-to-point communication between antennas but also reduces the chances that any two beams will cross and cause interference. “That’s very important when you have a high density of signals,” she says.

Flat metal plates placed on the ceiling offer near-perfect reflection. “You also need an absorber material on the rack to make sure the signal doesn’t bounce back up,” says Ms. Zheng.

Wireless can add 0.5 terabytes per second

Data centerAccording to Technology Review, the UCSB team worked with Lei Yang from Intel Labs in Oregon and Weile Zhang at Jiao Tong University in Xi’an, China, to simulate a 160-rack data center to see how the system might work. “Our simulation shows that wireless can add 0.5 terabytes per second,” she says.

IBM is also looking into using wireless technology in data centers, Scott Reynolds, a researcher at IBM’s T.J. Watson Research Center in Yorktown Heights, NY, who has been developing 60-gigahertz systems told TR. “These data centers are just choked with cables,” he says. “And so every time you want to reconfigure one it’s very labor-intensive and expensive.” But one problem with turning to wireless transmission, he adds, is that “you need to have hundreds of these wireless data links operating in a data center to be useful.” Since 60-gigahertz Wi-Fi has only four data channels, it’s important to configure the beams so they don’t interfere with each other.

Mark Thiele, the EVP of data center technology at Switch CommunicationsSuperNAP data center, told GigaOm that the research is worth following as low-latency networking inside the data center can be a bottleneck today for applications that range from financial trading to trying to move gigantic data sets around.

TR reports Ms. Zheng and her colleagues are now working on building a prototype data center to put their solution into practice.

rb-

Cable mess under a raised floorHaving just done a small data center cleanup, the idea is appealing. We pulled out 2 generations of cabling, IBM Type 1, and a bunch of Cat 3 multi-pair out from under the deck.

Ms. Higginbotham says the choice of 60 GHz for the data center is a smart move. Intel is pushing 60GHz for consumer use, under the WiGig brand (I wrote about WiGig in 2010 here). This means the chips would be cheap.

Some of the possible security issues raised by running Wi-Fi in the data center are tempered by using the 60Ghz range. She says if you are worried about someone standing outside the data center trying to eavesdrop on the data you are transmitting the 60Ghz, signals deteriorate rapidly.

Of course, change is hard and data center guys are going to have to learn wireless and top-of-rack switches would have to get radio cards installed. The Wi-Fi reflective panels would have to be installed on the ceiling of the data center and the servers would need a signal-absorbing surface so the Wi-Fi signals don’t continually bounce around the data center.

Just if you are confused about WiGig, Wi-Fi, and IEEE, EETimes says, “WiGig forged a deal with the Wi-Fi Alliance so its 60 GHz approach can be certified as a future generation of Wi-Fi. The group has aligned its technical approach with the existing IEEE 802.11ad standards effort on 60 GHz.”

Now if only they could do wireless electricity……..

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Never Check Email First Thing In The Morning

– Updated 03-18-12 – Science writer David Bradley on his blog ScienceText also recommends, “Avoid social networking and email first thing.” I know it works for me, I walk around and talk to staff before I get tangled up in the work everybody else wants me to do.

Never Check Email First Thing In The MorningSid Savara a widely regarded personal development trainer published 7 Reasons You Should Never Check Email First Thing In The Morning at his site sidsavara.com.

#1 – Ignorance Is Bliss … fully Productive – When it comes to email, ignorance is bliss. That’s why if you’ve got something important you want to make progress on, the author offers these four words for success:

SPAM computerDon’t check your email – As soon as you get in, work on something important for 30-45 minutes, and only then check your email. If you can stand it, wait even longer. The article suggests that as long as you’re ignorant of everything else that’s going on outside, you can concentrate on what you want to work on.

Any new information you get can cause you to get distracted.

#2 – It’s Not Your Todo ListMr. Savara you know what is most important for you to work on the first thing in the morning you should go ahead and do it! By checking email, you risk doing what someone else wants you to do. Or more bluntly, when you check your inbox, the emails you get are a to-do list someone else makes for you.

Who is in charge of your time – you, or the person emailing you?

Lack of Direction#3 – It’s An Excuse To Lack Direction – The author says that checking email is a low-priority activity and that you may be checking email first thing in the morning because your to-do list has gotten off track somewhere. He argues that when you don’t have a clear list of priorities, checking email becomes an urgent activity that you do at the expense of your important ones.

#4 – Reaction vs “Proaction” – When you check your email, you end up with more work to do – and because we’re in “check email” mode, we start replying to them at the expense of the task we were just working on. Rather than actively setting an agenda, email forces you to react to items as they come in – regardless of their true priority.

Mr. Savara says he prefers taking proactive actions. Work on the things that are important to you, regardless of whether they’re urgent or simply at the top of your inbox. Stop wasteful actions, and focus on productive actions instead.

social networking#5 – Searching For Excuses Blindly checking email (or Twitter, or Facebook, or any number iTime wasters) is usually just searching for an excuse to not do the work that must be done according to the author. Don’t fall into that trap. Don’t give yourself an out by checking your email for an excuse to fail. He urges, don’t check your email  – acknowledge the task you need to get done and do it.

Cross that bridge – it’s not going away.

#6 – There’s No Set Time Limit – Meetings get a bad rap for being a waste of time – but at least you usually know how long a meeting will last. But do you know how long you’re going to spend on email once you open your inbox, odds are you don’t know – or you’ll underestimate it.

The problem is, checking email only takes a minute but you can get sucked into follow-up activities that result from opening your email, and there’s no way of knowing how much time these will take. You have a set time limit for how many productive hours you have in a day don’t let email suck you in and cause you to devote more time to it than you can afford.

#7 – It Builds Expectation – A lot of people say, “But I have to check my email! People expect a response from me in the morning!” The author believes that there are some requests that need immediate responses, but they’re much less frequent than you might think.

TimeHe argues that people expect a response from you in the morning because you’ve always responded first thing in the morning and you’ve built that expectation. The more often you check email, the more often people will expect you to check it. Just stop checking it first thing in the morning, and people won’t expect it anymore.

Mr. Savara recommends the following email rules:

  • Only check if there is something specific you are looking for. Most important – don’t go fishing around. Check it with a specific plan, a specific email you’re looking for from a specific person.
  • Separate low-value emails via filters (“rules” in outlook) or separate email addresses so you don’t even see them in your inbox when you check
  • Set a time limit. Commit to checking for 5 minutes, just to look for that one piece of information – and have your exit strategy ready. Before you open your inbox, decide what you’ll do if 1) the email is there 2) the email isn’t there 3) the email is incomplete. Don’t be reactionary – proactively decide what action you will take based on the outcomes you expect.
Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

QR Codes Can Put Users at Risk

-Updated 01-26-12- It was just a matter of time and now the Websense (WBSN) ThreatSeeker Network has started spotting spam messages that lead to URLs that use embedded QR codes. According to a report at Help Net Security, this is a clear evolution of traditional spammers towards targeting mobile technology. The spam email messages look like traditional pharmaceutical spam emails and contain a link to the Web site 2tag.nl. Once the 2tag.nl URL from the mail message is loaded in the browser, a QR code is displayed, along with the full URL. When the QR code is read by a QR reader, it automatically loads the spam URL.

QR Codes Can Put Users at RiskQuick Response codes (QR codes) are a “new” type of barcode that can be used for a variety of purposes tracking, ticketing, labeling of products, etc. They can be put anywhere, in magazines, buses, websites, TV, tickets, and on almost any object which they might want to learn more about.

QR codeHelp Net Security writes that when used for legitimate purposes, they make life easier for users. “All you need to ‘visualize such a code is a smartphone with a camera and a QR reader application to scan it – the code can direct you to websites or online videos, send text messages and e-mails, or launch apps,” point out BullGuard’s researchers.

Unfortunately, QR codes can just as easily be used to compromise users’ mobile devices. “Much like URL shortening services can be and are used maliciously because of the fact that they obscure the real target URL, QR codes can also be used for such deception,Joe Levy, CTO of Solera Networks told DarkReading. “QR codes … provide a direct link to other smartphone capabilities such as email, SMS, and application installation. So potential attack vectors extend beyond obscured URLs and browser exploits very nearly to the full suite of device capabilities.”

Mobile malwareThere are several ways attackers are already using malicious QR codes to perpetrate their scams. A recent attack via QR code “Attaging” took place in Russia and involved a Trojan disguised as a mobile app called Jimm. Once installed, “Jimm” sent a series of expensive text messages ($6 each), racking up unwanted charges.

On Apple (AAPL) iOS devices, hackers are sending users to websites that will jailbreak the device and install more malicious malware. Tomer Teller, security evangelist at Check Point Software Technologies, told DarkReading, “a user scans a barcode and is redirected to an unknown website … the user phone will be jailbroken and additional malware could be deployed (such as key loggers and GPS trackers).

Google AndroidOn the Google (GOOG) Android  … Criminals are redirecting users to download malicious applications. All a user needs to do is scan a barcode and it will redirect to a website that will download the Android Application” according to the article.

In addition, attackers are using QR codes to redirect users to fake websites for phishing. “A QR code will redirect to a fake Bank that will look exactly like your bank. Since most smartphone screens are small, a normal user may not see the difference and will type in his or her (information) and hand it to the attackers,” Teller says. According to Mobile Commerce News some apps, like the NeoReader from Neomedia, that collect personally identifiable information (PII). This information is then sent to third parties who mine the data and possibly resell it.

mobile QR based paymentThe trend to mobile QR-based payment systems from firms like LevelUp, Kuapay, and Paypal are developing will drive QR code malware forward Mr. Levy says. “As our mobile devices and our wallets continue to converge through such technologies as near field communications (NFC), Bump and QR, malware authors are bound to prefer these very direct paths to the money. After all, these devices and apps are well on the road to becoming our new currency.”

So how do you protect yourself and the data on your mobile?

  • Download an app that scans QR codes and barcodes and shows the URL to which the codes want to take you. “Only use QR code reader software that allows the user to confirm the action to be taken i.e. visit a website link,” Paul Henry, security and forensic analyst at Lumension told DarkReading. “If you do not know and trust the link, cancel the action.
  • Do not scan QR codes from random stickers on walls and similar surfaces. Help Net Security says scammers are counting on people to do that because they can’t curb their curiosity.
  • Consider installing a mobile security app on your device, especially if it runs the Android OS. “Android is an open platform, which means that its source code can be examined by criminals and exploited easily when they find a weakness in, say, the Android browser,” according to the article. “That’s why most malicious apps transmitted via QR codes target the Android-based smartphones.”

rb-

I am not a fan of QR codes they seem to take you to an advertisement. Most of the destinations are fluff at best and dangerous at worst. Now that they have become nearly ubiquitous, they present more risk than necessary. Avoid QR codes.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Web Connected Television New Source of Threats

Web Connected Television New Source of ThreatsYou may want to consider the security of the fancy new 55-inch high-def LCD Television that Santa Claus brings you. Surprise, surprise, surprise they may have security holes that could allow hackers to take over your home network. Consumer appetite for on-demand and online video content will drive sales of Internet-connectable TV devices to nearly 350 million units worldwide by 2015 reports ITnewsLink.

Parks AssociatesConnected Living Room: Web-enabled TVs and Blu-ray Players forecasts worldwide sales of Internet-connectable HDTVs, Blu-ray players, game consoles, and digital video players like Apple‘s (AAPL) Apple TV will grow about fourfold from 2010.

Parks Associates says all major manufacturers are debuting new models with innovations in content aggregation, apps development, and user interfaces. Content options are finally catching up to the hardware innovations, and growing libraries of on-demand movies and TV available are starting to unlock the potential of connected TV devices as multifunction online entertainment and communications platforms.

The growth of these devices will increase opportunities for apps developers – including third-party developers and giants such as Google (GOOG), Samsung, and Yahoo (YHOO), and one other group, hackers.

Mocana logo Mocana, a company that focuses on securing the “Internet of Things”, released a study that highlights digital security flaws in Internet-connected HDTVs reports ITnewsLink. The Mocana researchers believe that the security flaws exist in many Internet TVs and recommend that consumers seek out third-party security tests before they purchase and install them in their homes.

Mocana’s CEO Adrian Turner told ITnewsLink: “…manufacturers are rushing Internet-connected consumer electronics to market without bothering to secure them … consumer electronics companies that might lack internal security expertise should seek it out, before connecting their portfolio of consumer devices to the Internet.”

Computer securityMocana’s research shows that attackers may be able to leverage Internet-connected TVs to hack into consumers’ home networks. Researchers found that the Internet interface failed to confirm script integrity before those scripts were run. Mocana was able to show that JavaScript could then be injected into the normal data stream, allowing attackers to obtain total control over the device’s Internet functionality. As a result, an attacker could intercept transmissions from the television to the network using common “rogue DNS”, “rogue DHCP server”, or TCP session hijacking techniques. The security holes could allow attackers to:

  • Present fake credit card forms to fool consumers into giving up their private information.
  • Create a man-in-the-middle attack on the HDTV to dupe consumers into thinking that “imposter” banking and commerce websites were legitimate.
  • Steal the TV manufacturer’s digital “corporate credentials” to gain special VIP access to backend services from third-party organizations including popular search engines, video streaming, and photo sharing sites.
  • Monitor and report on consumers’ private Internet usage habits without their knowledge.

The flaws Mocana uncovered should raise questions about the security of consumer electronics in general-which manufacturers are scrambling to connect to the Internet, often with little or no security technology on board.

Alfred E. NewmanMocana’s CEO Adrian Turner continued: “While much public discussion … on the recent explosion of smartphones … the vast majority of new devices coming onto the Internet aren’t phones at all: they are devices like television sets, industrial machines, medical devices, and automobiles – devices representing every conceivable industry. And the one thing that all these manufacturers have in common is that, unlike the computing industry, they don’t have deep experience in security technology.”

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.