Tag Archive for iPhone

70s Glitch Could Hit Every Computer On Earth

70s Glitch Could Hit Every Computer On The PlanetRebecca Borison at the BusinessInsider asks who remembers the 1999 panic about the Y2K crisis. In 1999, Y2K looked as if it might derail modern life when computers because the glitch would reset computers to Jan 1. 1900, rather than Jan. 1, 2000, because computers only used two digits to represent a year in their internal clocks.

déjà vu all over againNow it déjà vu all over again, BI reports there’s a new, even bigger global software coding fiasco looming.  A huge amount of computer software could fail around the year 2038 because of issues with the way the code that runs them measures time.

Once again, just like with Y2K every single piece of software and computer code on the planet must now be checked and updated again. That is not a trivial task according to the author. In 2000, we bypassed the Y2K problem by recoding the software explains Ms. Borison. All the software — a fantastically laborious retrospective global software patch.

Disruption to the tech industry

Y2K problemAlthough Y2K was not a disaster, it was a massive disruption to the tech industry at the time. Virtually every company on the planet running any type of software had to find their specific Y2K issue and hire someone to fix it. Ultimately, Y2K caused ordinary people very few problems — but that’s only because there was a huge expenditure of time and resources within the tech business.

The 2038 problem will affect software that uses what’s called a signed 32-bit integer for storing time. The problem arises because 32-bit software can only measure a maximum value of 2,147,483,647 seconds. This is the biggest number you can represent using a 32-bit system.

time is represented as a signed 32-bit integerWhen a bunch of engineers developed the first UNIX computer operating system in the 1970s, they arbitrarily decided that time would be represented as a signed 32-bit integer (or number), and be measured as the number of milliseconds since 12:00:00 a.m. on January 1, 1970.

Glitch says it’s 1970 again

On January 19, 2038 — 2,147,483,647 seconds after January 1, 1970 — these computer programs will exceed the maximum value of time expressible by a 32-bit system using a base 2 binary counting system, and any software that hasn’t been fixed will then wrap back around to zero, thinking that it’s 1970 again.

UNIX time coding has since been incorporated widely into any software or hardware system that needs to measure time.

BI spoke with Jonathan Smith, a Computer and Information Science professor at the University of Pennsylvania for confirmation. The professor confirmed the Year 2038 is a real problem that will affect a specific subset of software that counts on a clock progressing positively. He elaborated:

Most UNIX-based systems use a 32-bit clock that starts at the arbitrary date of 1/1/1970, so adding 68 years gives you a risk of overflow at 2038 … Timers could stop working, scheduled reminders might not occur (e.g., calendar appointments), scheduled updates or backups might not occur, billing intervals might not be calculated correctly

The article concludes that we all need just to switch to higher bit values like 64 bits, which will give a higher maximum. In the last few years, more personal computers have made this shift, especially companies that have already needed to project time past 2038, like banks that need to deal with 30-year mortgages.

64 bitsApple (AAPL) claims that the iPhone 5S is the first 64-bit smartphone. But the 2038 problem applies to both hardware and software, so even if the 5S uses 64 bits, an alarm clock app on the phone needs to be updated as well. (If it’s using a 32-bit system in 2038 it will wake you up in 1970, so to speak.) So the issue is more of a logistical problem than a technical one.

HowStuffWorks reports that some platforms have different dooms-days.

  • IBM (IBM) PC hardware suffers from the Year 2116 problem. For a PC the beginning of time starts at January 1, 1980, and increments by seconds in an unsigned 32-bit integer in a way like UNIX time. By 2116, the integer overflows.
  • Hardware and softwareMicrosoft (MSFT) Windows NT uses a 64-bit integer to track time. However, it uses 100 nanoseconds as its increment and the beginning of time is January 1, 1601, so NT suffers from the Year 2184 problem.
  • On this page, Apple states that the Mac is okay out to the year 29,940!

rb-

The tech industry’s response to Y2K suggests that they will mostly ignore the 2038 issue until the very last minute when it becomes to ignore.  Another example of the pace of global software updates is that a majority of ATM cash machines were still running Windows XP, and thus vulnerable to hackers even though Microsoft discontinued the product in 2007.

Dont worryFortunately, the 2038 problem is somewhat easier to fix than the Y2K problem. Well-written programs can simply be recompiled with a new version of the C-library that uses 8-byte values for the storage format. This is possible because the C-library encapsulates the whole time activity with its own time types and functions (unlike most mainframe programs, which did not standardize their date formats or calculations). So the Year 2038 problem should not be nearly as hard to fix as the Y2K problem was.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Hidden costs of BYOD

Hidden costs of BYODFierceMobileIT points out research from Visage Mobile has identified even more hidden costs in an informative infographic based on data collected between January and April 2013 from 180 companies.

These hidden costs include high roaming charges, as well as downloads of premium text services and sexting apps by employees. Employees download $13,640 worth of unapproved apps, ringtones, and premium services every month. As a result, 15 percent of a company’s phone bill has nothing to do with business, according to the research.

rb-

Ummm – Acceptable use policy? A deduct from their phone stipend?

Hidden costs of BYOD

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

How Tough is an iPhone 5s?

How Tough is an iPhone 5s?According to some reports, the Apple (AAPL) iPhone 5s is the greatest iPhone ever. But how tough is it? Apparently, the iPhone 5s does pretty well when dropped on the sidewalk and does not object to a quick dip into the water.

But can the iPhone 5s defeat a .50-Millimeter rifle?

RatedRR answers the question. Click below to see the results.

rb-

I could go on a sociological rant about the modern-Americas need to put heroes (or their representation) on a pedestal only to gleefully knock them down later.

But – today seemed to be the day for some random destruction.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

802.11ac Wi-Fi – Don’t Bother Yet

802.11ac Wi-Fi - Don't Bother YetThe new iPads are here! The new iPads are here! There’s no 802.11ac here! But that’s expected. Experienced Apple watchers know that Apple likes to let new radio technologies mature before they integrate them into their new idevices. So that means most enterprises can slow their plans to upgrade their Wi-Fi to the new standard according to Kevin Fitchard at GigaOM.

The new iPads are hereThe latest Apple (AAPL) tablet doesn’t sport the new soon-to-be-completed IEEE 802.11ac standard, even though Apple’s latest generation routers, PCs, and laptops all support it. GigaOM reports Apple is providing is a speed boost to the now thoroughly established 802.11n networking standard in the form of multiple-input multiple-output (MIMO) smart antenna technology. Like many Wi-Fi routers on the market, the iPad Air has dual antennas, allowing it to wend two parallel paths over the unlicensed airwaves. The MIMO implementation will double the speeds at which the iPad can access Wi-Fi networks, according to Apple.

The Wi-Fi Alliance only began certifying commercial 802.11ac devices in June, and even those devices only incorporate partial versions of the full 802.11ac spec. The IEEE isn’t expected to fully complete the standard until 2014. Very few smartphones and tablets have ac embedded as of yet, though the technology is making its way into consumer and enterprise routers and PCs, including Apple’s newest MacBooks and iMacs.

iPad AirBut waiting another year for 802.11ac-enabled iPhones and iPads also means we’ll probably have to wait another year before we see wide-scale adoption of the standard in public hotspots and access points. Unlike in the home, most outdoor and public Wi-Fi connections are made over mobile devices, not PCs.

In an interview with GigaOM, Boingo VP of corporate communications Christian Gunning said it hasn’t turned up 802.11ac in any of its hundreds of thousands of owned and managed hotspots yet, simply because it’s seeing very few devices with ac radios trying to access its network.

higher-powered 802.3at Power over EthernetFierceCIO‘s Paul Mah offers more reasons to delay the roll-out of 802.11ac. The advanced 802.11ac radio is more power-hungry than earlier iterations of Wi-Fi. So it will more likely need the use of the higher-powered 802.3at Power over Ethernet (PoE) to run 802.11ac with all its bells and whistles. It is possible that businesses still on 802.3af PoE (rb- Majority) may well have to incur extra infrastructure costs to deploy 802.11ac today. Mr. Mah contends that it is yet to be seen if improved 802.11ac chipsets will allow firms to stick with legacy PoE. (rb- For a refresher on PoE, check out these posts 802.3af and 802.3at)

Another consideration according to FierceCIO is clients. The handful of business-grade 802.11ac wireless APs on the market today typically support three spatial streams, which allows for a (theoretical) maximum data rate of 1.3Gbps in the 5GHz band. Though this is a significant improvement over 450 Mbps 802.11n, the dearth of 802.11ac client devices renders this a moot point. Some will argue that Apple did incorporate 802.11ac into the new MacBook Air laptops.  However, they did not include it in the new iPads, or the iPhone 5S and iPhone 5C smartphones. And with no smartphones or tablets equipped with 802.11ac capabilities today, this does make deploying it a rather pointless strategy for BYOD.

802.11ac "second wave"Finally, Mr. Mah points out that while 1.3Gbps is a good speed to have, we should keep in mind that 802.11ac does have a theoretical maximum speed of 7 Gbps. A “second wave” of 802.11ac that implements four or more data streams for much faster speeds should be arriving in the second half of 2014. He says current signs are that this second wave of 802.11ac devices might need new processor chips–which means you will have to buy new 802.11ac hardware to benefit.

GigaOM’s Fitchard stresses Apple’s influence when it comes to popularizing new technology, he says the iPhone and the iPad’s reach shouldn’t be underestimated. As an example, new Passpoint-certified phones have been out for more than a year, but it wasn’t until Apple started offering support for Passpoint’s automatic login technology in iOS7 that the wireless industry took notice. It was only after Apple made iOS7 publicly available, that Boingo started Passpoint trials.

rb-

I’m not saying 802.11ac is a bad thing, but enterprises need to ignore the hype cycle and make decisions that are best for them and not the multi-billion dollar networking industry. IMHO 802.11ac is still immature, there are few devices out there that can fully take advantage, the full feature set is not fully implemented in silicon and you finished the upgrade to 802.11n yet?

What to do?

What does your wired network look like? Are you still connecting your AP’s at 100 Mbps? That is a bottleneck with 802.11n.

Do you have enough juice? What is your PoE status? Do you have enough PoE+ ports? Are they being used for just an access port – wasting the extra costs of a PoE port?

Both switches cost money, is there a budget available for these items or is IT going to spend an operational budget to address a structural issue?

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

BYOD Love Affair Waning?

BYOD Love Affair Waning?Tom Kaneshige at CIO.com warns that the “Bring Your Own Device” love affair is coming to an abrupt and bitter end, and the lawyers are circling. He argues that in the early days of BYOD, say, last year, employees, especially Millennials, fell madly in love with the idea of using their own Apple (AAPL) iPhones, Google (GOOG) Android smartphones, and newfangled tablets for work. Finally, they could finally ditch corporate-issued BlackBerrys (BBRY).

Bring your own deviceBYOD ushered in a new era of consumer tech in the enterprise, one that promised employees and employers will live happily ever after. But the BYOD romance has suddenly turned sour. Employees are questioning corporate intrusion on their personal devices. Did IT turn their beloved smartphone into a spy that tracks their whereabouts? The article says employees are beginning to sense companies taking advantage of BYOD by intruding on personal time to get free work time.

Now they’re thinking about suing. John Marshall, CEO at AirWatch, an enterprise mobile device management (MDM) vendor with 6,500 customers, told CIO, I anticipate a bunch of little [lawsuits], then something big will happen that’ll be a class action and become headline news.

Air Watch logoCEO Marshall reports that the suits have already started. A federal case in Chicago is winding its way through the courts which claims that the city owes some 200 police officers millions of dollars in overtime back pay. The case centers on allegations that the city pressured officers into answering work-related calls and emails over department-issued BlackBerrys during off-hours.

There’s no question BYOD blurs the line even more between work life and personal life. The Airwatch CEO not surprisingly recommends a Mobile Device Management (MDM) application to control email delivery to BYOD devices. This way an employer can set a business rule that won’t allow delivery of corporate email to a subset of users during off-hours. Or a CIO can address this issue in the BYOD terms-of-use agreement. (rb– Both would be best)

Smashed BYODThe CIO article offers up another legal nightmare scenario: Lacking MDM tools to block out what can and cannot be seen on a BYOD smartphone, a help desk technician notices that an employee’s device has a lot of personal apps about a health problem—and mentions his concern to the employee in the cafeteria.

The employee can say, ‘How in the world did you know that?‘” Mr. Marshall says. “All of a sudden, something that’s very benign and innocuous turns into something that’s blown out of proportion.” (rb- Help Net Security cites recent U.S. DHSS seven-figure settlements from healthcare institutions that failed to protect patients’ health information under HIPAA regs.)

terms-of-use agreementMr. Marshall recommends a comprehensive BYOD terms-of-use agreement, along with transparency about the capabilities and limitations of the technology, will help ward off such scenarios. The IT staff also needs to be educated about their role in a BYOD environment.

However, this doesn’t mean problems won’t crop up. Part of the problem, the article indicates, is that BYOD often puts business unit managers who aren’t well-versed in technical user agreements in a leadership position with mobile apps. They’re likely to give the green light to rogue mobile apps that violate such agreements.

location-based servicesFor instance, employees are chiefly concerned about privacy and especially location-based services with BYOD, and so many user agreements stipulate that apps will not collect location-based information. But someone who wants to be helpful, builds a map app for the corporate campus that allows employees to schedule conference rooms and find safety information, such as where to go if there’s a tornado. Airwatch’s Marshall explains:

Maybe there’s also a button on there that says where you are in the campus … All of a sudden people wake up and realize that every single device using that app is collecting location-based information—that’s an issue. These are really plausible scenarios … There’s so much copy and paste and reuse of all these components that these things can happen very innocently.

remote wipeThen there’s the dreaded remote wipe, which can land a company in some legal hot water according to the article. Help Net Security says there is little to no case law in this area. CIO.com reports that just last year, CIOs said they felt comfortable with BYOD because they held security’s holy grail: remote wipe, a scorched-earth capability for wiping all data on a mobile device.

But employees weren’t happy with the idea that the company can wipe personal data on their personal device. Some employees refused to take part in the BYOD program for this reason. Others waited days or weeks before reporting a lost or stolen device so that IT wouldn’t wipe it.

waited days or weeks before reporting a lost or stolen deviceMDM software advanced quickly and seemed to come up with a fix. Now companies can wipe only corporate apps from a BYOD smartphone or tablet, leaving personal apps untouched. In fact, AirWatch won’t even allow a full device wipe anymore for legal reasons. While this helps tremendously, it doesn’t completely solve the problem.

Mr. Marshall proposed a scenario where a company buys the popular productivity app, Evernote, for employees to put on their BYOD smartphones. Since the company paid for the app, the company can remove it at any time. The note-taking app collects company data but also might store personal data, too. An employee can use Evernote to create a shopping list, recipes, vacation plans, or perhaps something more critical to their job.

Finger pointingGuess what happens to this personal data when the employee leaves the company? The app, along with all the data, is wiped from the device and account. If the BYOD terms-of-use agreement about Evernote wasn’t spelled out clearly, who is liable for the lost data?

The bloom is off the BYOD rose, and so companies had better add protections against employee lawsuits in the BYOD terms-of-use agreement and leverage MDM to make sure the agreement is followed.

Truth is, employees tend to get a bit emotional when their privacy is violated or their location is tracked via a mobile device that they personally own. They don’t like their personal data to be wiped, either. When these things happen, companies can expect the wrath of a scorned employee. “That’s where it gets tricky,” Mr. Marshall told CIO.com.

Tony Busseri, CEO of Canadian digital security firm Route1, told Help Net Security:

Angry BossAlong with security concerns, BYOD has brought the potential of major legal issues for the Enterprise … Many current BYOD corporate policies leave enterprise data unprotected in the event of a security breach and during an employee’s exit from the company. The policy of tracking and wiping an employee’s personal device opens the enterprise up to the potential for mass litigation.

rb-

Misco in the UK reported that the majority of employees will not cooperate with employers’ BYOD efforts. According to the data:

  • 82% of the survey participants viewed their employer’s ability to track their location as an invasion of privacy;
  • 82% are concerned or extremely concerned about having their browsing history monitored;
  • 76% stated that they would not allow their company to view the applications installed on their personal mobile devices;
  • 75% said they would not go along with an installation made by their employer;
  • Only 15% had no concerns about employers tracking activities.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.