Tag Archive for USB

Smart Backpacks

Smart BackpacksI first wrote about Google’s Project Jacquard which weaves conductive threads to create touch-responsive clothing in 2015. Since then COVID has changed the world. As a result of the pandemic, Gartner found that 88% of businesses mandated or encouraged all their employees to work from home as COVID-19 spread and 97% of the firms canceled all work-related travel.

Despite the growth in WFH, Google’s Project Jacquard has announced its latest innovation: two new smart backpacks developed with luggage maker Samsonite. Unlike the previous Jacquard backpack co-created with Yves Saint Lauren with a stupid $995 price tag, The Samsonite version has prices low enough for normal people to actually consider buying one.

The new Google Jacquard “Konnect-i Slim” smart backpack begins at $199.99. The slightly larger “Konnect-i Standard” will run you $219.99. Both available are through Samsonite’s webshop. Both are also water-repellent, and they have the same materials and feature list.

Besides smart backpacks, Google has partnered with Levi to make the Trucker jacket with Jacquard and Adidas to create the GMR insoles that use Jacquard.

Connect the smart backpacks

Jacquard controlsTo connect the smartbackpack to your iOS or Android phone, you’ll have to stuff a thumb-sized dongle into the backpack’s strap. According to Engadget, the module syncs with your phone via Bluetooth. The functionality seems pretty limited. Through the Jacquard app, you can define what brushing up and down or double-tapping the strap does. You can skip or pause your music, ask Assistant a question or drop pins to remember places you’ve been, or take a selfie. An LED on the strap will light up to alert you to notifications.

Jacquard relies on a small Micro-USB-charged Bluetooth puck which contains most of the electronic components. Google reduced the physical footprint from a large USB drive to something roughly the size of an SD card. It’s charged using magnetic pins, and data transfer is possible with a microUSB connector. The removable Jacquard Tag lasts up to two weeks on a charge and is separately rechargeable. The Jacquard Tag module still needs to be removed before washing.

The Samsonite Jacquard backpacks require an internet connection, a compatible Android or iOS phone, the Jacquard app, and a Google account for access to Jacquard features. For Android, you need a supported phone running Android 6.0.1 or newer. For iOS, you need an iPhone 6 or newer running iOS 11 or newer.  Data usage fees may apply. 

rb-

Ambient computingAs a product still don’t get it – as wearable tech – it seems to me that the $200 iWatch can do more than the backpacks. But as another way to invade our lives and steal our data – it makes sense.

Google told CNet it could add gestures on top of voice into Google Assistant – “… as a new direction for Google’s AI … Bringing these nonverbal cues into the conversation with technology is a key opportunity …” 

Combining AI with Google’s security and privacy problems makes me uneasy. In this uber-google world, will they give us the best result or the one that is paid for? 

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Seven Social Engineering Classics

Seven Social Engineering ClassicsSocial engineering describes various non-technical attack techniques cybercriminals use to manipulate users. The attackers hope the user will bypass security or other business process protocols, perform harmful actions, or disclose sensitive information. Beware of these social engineering classics.

Business Email Compromise

Business Email CompromiseDon’t get fooled by official-looking emails even though the email appears to be work-related. Subject lines such as “Invoice Attached” or “Here’s the file you needed” might be a social engineering classic. To be sure, you should hover your cursor over email addresses and links before clicking to see if the sender and type of file are legitimate. BEC is the most costly form of cybercrime. It stems from faked emails called “Business Email Compromise” or BEC scams. A typical BEC scam involves phony emails in which the attacker spoofs a message from an executive at a company and tricks someone into wiring funds to the fraudsters.

VishingVishing

Corporate phone systems are often set up to forward voice mail audio files to employees’ inboxes. While this is convenient, forwarding the files can be risky. It makes it harder to determine if the email is phony or legit. Since 2014, scammers have been installing malicious software through emails designed to look like internal voicemail messages, making vishing a social engineering classic.

With vishing, cybercriminals use an urgent or alarming voicemail message to try to get potential victims to call back with their personal information. Fake caller ID information is often used to make the calls appear to be from a legitimate organization or business.

Free Stuff, a social engineering classic

Free pizzaFree Stuff is one of the oldest social engineering classics. Most people can’t resist free Stuff, from pizza to software downloads, and they will click just about any link to get it. Of course, nothing is truly free. Sophisticated attackers might send a link to genuine free software, but they’re sending you through their website, which means you may get infected or compromised.

Baiting

Baiting is a variant of “Free Stuff.” The attacker hopes to trick their victims into executing code by piquing their curiosity or convincing them to run hardware or software with hidden malware. For example, innocent-looking USB sticks handed out at a conference or casually “dropped” in the parking could contain malware. They then detonate when the curious user plugs it into their PC. This is how Stuxnet attacked the Iranian nuclear program.

Quid pro quo social engineering classic

Seven Social Engineering ClassicsAnother version of “Free Stuff.” In Latin, Quid pro quo means “something for something.” In exchange, the attacker offers something of genuine worth to the victim and will work their way into the target’s network. An example: The attacker poses as tech support and solves a problem for you, then convinces you to type in a line of code that serves as a “backdoor.” On the other hand, it may be as simple as trading a candy bar in exchange for a password!

Waterholing

This attack plants malware on a website you and your colleagues frequently visit. The next time you surf the site, the malware—such as a remote-access Trojan or RAT—is downloaded to your computer. And just like that, the attacker can begin exfiltrating data from your employer’s network.

Pretexting

Pretexting is another form of social engineering in which attackers focus on creating a fabricated scenario that they can use to try to steal their information. It is a true con game. It relies on the crook fostering a sense of trust in the victim.

Pretexting

Pretexting can also impersonate co-workers, police, banks, or tax authorities. It pretends to be any individual who could have perceived authority or right-to-know in the targeted victim’s mind. In some cases, all that is needed is an authoritative voice, an earnest tone, and an ability to think on one’s feet to create a pretext scenario.

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Is Your Battery Healthy?

Li-ion batteries need very different care and feedingLithium-ion batteries have been in the news lately for causing fires and explosions. Explosions have happened with e-cigarettes, hoverboards, and the Samsung Galaxy Note 7, which was banned from all flights by the FAA due to its explosion risk. Despite the risks, most of today’s most popular gadgets have a battery.

Is Your Battery Healthy?Fred Langa at Windows Secrets Newsletter posted an article on how to get the most out of the lithium-ion (Li-ion) batteries. Li-ion batteries need very different care and feeding than the nickel-cadmium (Ni-Cd) and nickel-metal-hydride (Ni-MH) batteries used in earlier devices. Proper care of a Li-ion battery can result in as much as 15 times longer service life than with an improperly cared-for battery.

Steps to extend the battery service life

The article does not cover ways to get more run time between recharges; those techniques are already well-known. Most portable devices offer ample manual and automatic power-saving modes and methods such as adjusting screen brightness, slowing CPU speed, and reducing the number of apps running.

15 times longer service lifeRather, the article focused on ways to extend the battery’s overall service life. Follow these five important tips, and you’ll help make sure that your Li-ion batteries will deliver long, full, safe service lives in your new portable devices.

Keep your lithium batteries cool

Heat is the number-one enemy of Li-ion batteries. Heat issues can be caused by usage factors such as the speed and duration of battery charging and discharging. The physical environment also matters. Simply leaving your Li-ion powered device in the sun or in an enclosed car, even if the device isn’t being used, can significantly reduce the battery’s ability to take and hold a charge according to the article.

battery capacity can be reduced by 50%.Li-ion batteries perform best at about normal room temperature (68F/20C). If the device warms to 86F/30C, its ability to hold a charge drops by about 20%. Mr. Langa says if the battery is used at 113F/45C — a temperature easily reached by devices that are working hard or that are in the sun, battery capacity can be reduced by 50%.

So if your device or battery becomes noticeably warm while you’re using it, the article recommends moving to a cooler place. If that’s not possible, try reducing the amount of power the device is using by turning off unneeded apps, reducing screen brightness, or activating the device’s power-saving mode.

Of course, you can turn the device fully off until its temperature returns to normal. For fastest cooling, remove the battery, if possible Windows Secrets recommends. The battery and the device will cool off faster if they’re physically separated according to the article.

Low temperatures aren’t as much of a worry. Low temps usually won’t cause any long-term damage, although a cold battery won’t produce as much power as it otherwise would. The power drop becomes very noticeable at temperatures lower than about 40F/4C. Most consumer-grade Li-ion batteries are essentially useless at temperatures below freezing.

If your Li-ion powered device becomes excessively chilled for any reason, don’t try to use it. The article says to leave it powered off and move it to a warm place until the device is at normal temperature. Once the battery warms to a normal temperature, so will its electrical performance.

Unplug the charger

Overcharging, leaving a battery connected to a too-Unplug the chargerhigh voltage source for too long, can reduce a Li-ion battery’s ability to hold a charge, shorten its life, or kill it outright according to the author. Most consumer-grade Li-ion batteries are designed to work at around 3.6 volts per cell but will accept a temporary overvoltage of around 4.2 volts while charging. Mr. Langa warns that if a charger outputs the higher voltage for too long, internal battery damage can occur.

In severe cases, Windows Secrets warns that overcharging can lead to what battery engineers delicately refer to as “catastrophic failure.” Even in moderate instances, the excess heat produced by overcharging will negatively affect battery life, as you saw in Tip #1.

High-quality chargers can work in concert with circuitry inside well-designed Li-ion-powered devices and their batteries, reducing the danger of overcharging by properly tapering off the charging current. The article says the simplest, can’t fail method is not to leave your Li-ion devices connected to any charger longer than needed.

These properties are quite different from those of older Ni-Cd and Ni-MH battery technologies, which did best when left on their chargers for as long as possible. That’s because those older battery types have a high rate of self-discharge; that is, they start losing a significant amount of stored energy the moment you take them off the charger, even if the device they power is turned off.

In fact, a Ni-Cd battery can self-discharge at a rate of 10% in the first 24 hours. The self-discharge curve flattens after that, but a Ni-Cd battery will still lose an additional 10–20% charge per month. Ni-MH batteries are even worse. Their self-discharge rate is about 30% higher than that of Ni-Cd.

But Li-ion batteries have a very low rate of self-discharge. A healthy, full, lithium battery will self-discharge at about only 5% in the first 24 hours off the charger — with only 2% or so per month after that.

It’s simply not necessary to leave a Li-ion device on the charger until the last possible moment. For best results and the longest battery life, unplug the charger when it or the lithium-powered device shows a full charge.

It’s also not necessary to give new Li-ion devices an extended charge before first use. (Ni-Cd or Ni-MH devices used to come with warnings to do an initial charge of anywhere from 8 to 24 hours.) Li-ion batteries are fully ready for use when the charger or the device reads 100% charge. No extended charging is needed.

Don’t deep-discharge your battery

Not all discharge cycles exact the same toll on a battery. Long and heavy usage generates more heat, putting more stress on the battery; smaller, more frequent discharges extend the overall life of lithium batteries.

Don't deep-discharge your batteryYou might think that a higher number of small discharge/recharge cycles would eat into the battery’s overall lifespan. That was true with older technologies, the author says it’s not the case with Li-ion. Battery specs can be confusing because most manufacturers count a full Li-ion charge cycle as whatever it takes to add up to a 100% charge. For example, three 33% discharge/recharge cycles equal one full-charge cycle, five 20% cycles equal a full charge, and so on.

In short, a higher number of small discharge/recharge cycles doesn’t reduce a lithium battery’s total available full-charge cycles.

Again, heat and stress from heavy discharges cut battery life. So try to keep your deep-discharge events to a minimum. Mr. Langa recommends that you don’t let your device routinely run down to zero charge (where the device turns itself off). Instead, think of the bottom 15–20% of battery capacity as a reserve — for emergency use only. Get into the habit of swapping in a fresh battery (if possible) or plugging the device into external power well before the battery is empty.

Slow and steady is best

Slow and steady charge/discharge is bestAs you now know, both fast discharging and fast recharging generate excess heat and exact a toll on battery life. Windows Secrets says if you’ve run a device long and hard, let the battery cool to room temperature before recharging it. Batteries won’t accept a full charge when hot. And when recharging, make sure your charger doesn’t make the battery become hot to the touch, a hot battery is a sign the charger is pumping too much current, too fast, through the battery.

Overcharging is more likely with chargers that are cheap, off-brand models; that use fast-charge circuitry; or that are wireless (inductive). These “dumb” chargers simply pump out current, accepting little or no feedback from the device being charged. Overheating and overvoltages can easily occur, damaging or even destroying the battery.

Fast chargers provide a useful charge to a drained battery in minutes and not hours. The author explains there are various approaches to fast-charging technology, and not all of them are compatible with all lithium batteries. Unless the charger and the lithium battery are specifically designed to work together, fast charging could cause overheating and overvoltages. Generally, it’s best not to use one brand of fast charger on a different brand’s device.

Wireless (inductive) chargers use a special charging mat or surface to restore a battery’s power. It sounds wonderfully convenient, but inductive charging always generates excess heat, even when it’s working normally.

Not only is the excessive heat produced by a wireless charger not good for lithium batteries, it also wastes energy. By its nature, inductive charging’s efficiency is always going to be lower than a standard charger’s. Mr. Lunga says that higher heat and less efficiency easily outweigh convenience.

In any case, the safest approach is to use only chargers sold by the OEM of your lithium-powered device. It’s the only way to be sure that the charger will keep temperatures and voltages within specs. The article recommends that if a OEM charger isn’t available, use a low-output charger that’s unlikely to pump damaging amounts of power into the device you’re charging.

One source of low-output, non-OEM charging that’s often available is the USB port on a standard PC. A typical USB 2.0 port provides 500mA (.5 amps) per port; USB 3.0 provides up to 900mA (.9 amps) per port. In contrast, some dedicated chargers will output 3,000-4,000mA (3-4 amps). The low amperage offered by USB ports will usually provide cool, safe charging of almost any Li-ion device.

If possible, carry a spare battery

carry a spare batteryIf your device allows for easy battery replacement, carrying a spare battery is cheap insurance. It will give you twice the run time. When the in-use battery approaches 15–20% charge, simply swap out the drained battery for a fresh, cool one — you get instant full power, with no heat worries.

A spare battery also allows for other benefits. For example, if you find yourself in a situation where the installed battery is running hot, you can swap out the hot battery to let it cool. Having two batteries should also eliminate any need to use fast chargers — you can charge the spare at a safe, slow rate while the other is in use.

rb-

For more tips on how to keep your Apple iPhone battery in tip-top shape, check out this post from 2014.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Wi-Fi Charges Up Ethernet

Wi-Fi Charges Up EthernetInformation Technology prognosticators Gartner (IT) predicts that 40% of enterprises will use Wi-Fi as the default connection for mobile and non-mobile devices by 2018 according to Fred Donovan at FierceMobileIT. The prediction says that typically fixed location devices like; desktops, desk phones, projectors, and conference rooms will use Wi-Fi as their primary connection replacing Ethernet.

Wi-FI logoGartner says Wi-Fi is facilitating BYOD. The enterprise Wi-Fi network now allows workers to choose any device and move anywhere in the workplace. Gartner argues that the introduction of security measures like 802.1X augmented with Advanced Encryption Standard (AES) encryption has lessened IT’s worry about security breaches involving the Wi-Fi infrastructure. Ken Dulaney, V.P. and distinguished analyst at Gartner said;

Ethernet cabling has been the mainstay of business workspace connectivity since the beginning of networking. However, as smartphones, laptops, tablets, and other consumer devices have multiplied, the consumer space has largely converted to a wireless-first world

Facilitating BYOD

As the first connection to the enterprise infrastructure, Wi-Fi brings workers the ability to choose any device and move anywhere without worry. VP Dulaney continued;

WI-FI certifiedAs bring your own device (BYOD) has increased in many organizations, the collision of the business and consumer worlds has changed workers’ demands

Furthermore, cabling systems or even peer-to-peer (P2P) wireless solutions using technologies that offer cable replacement have had to deal with a variety of connectors challenges, such as USB and micro-USB, as video systems move beyond Video Graphics Array (VGA). The market research firm also argues that MACD costs will decrease.

MACD costsAdditions, moves, and changes are costly inconveniences that waste time for enterprise IT organizations. A move can sometimes involve cabling changes that can cost as much as $1,000 … With Wi-Fi printers, desktops, and other devices, all that is required is a cable to the power source, leaving workers free to move themselves making reconfigurations of offices easier.

Because of the many benefits of Wi-FI, Gartner VP Dulaney predicts firms are going to change how they connect;

we expect many organizations to shift to a wireless-by-default and a wired-by-exception model.

New Ethernet specifications

In order to deal with the new wireless-by-default reality, changes are needed on the wired network.  at FierceCIO reports that the vendor community is working to address the Wi-Fi first world. Unfortunately, there are two industry groups pushing their own new Ethernet specifications. Mr. Mah says that new Ethernet standards are needed to work with Wave 2 of 802.11ac wireless access points (AP) with a theoretical maximum throughput of up to 3.5Gbps.

NCaptain Ethernetew standards are needed because the existing Gigabit Ethernet is a bottleneck and current alternatives are not attractive. First, link-aggregating two Gigabit Ethernet connections for each Wi-Fi AP would need additional cabling and more expensive managed switches to support it. Using 10GbE would be overkill. Upgrading to 10GbE is a significant investment that includes new Category 6a or Category 7 cables, more power, and more cabling.

One faction, the MGBase-T Alliance, was formed in June 2014 and includes; Avaya, Aruba Networks (ARUN), and Brocade (BRCD) as well as component vendors Broadcom (BRCM) and Freescale Semiconductor. The other group known as the NBase-T Alliance was formed in October 2014. This faction consists of Cisco (CSCO), Intel, Xilinx (XLNX), Freescale, and Aquantia, a company that’s already making 2.5G/5G components.

Little agreement on standards

At the moment, the only agreement between the two factions is that 2.5Gbps and 5Gbps speeds are needed. The IEEE 802 LAN/MAN Standards Committee has set up the P802.3bz 2.5/5GBase-T Task Force to address this issue. The 2015 Q1 CommScope Standards Advisor reports that the 802.3bz Ethernet cablescommittee has decided so far that:

  • 2.5 GBase-T option will run on Cat 5e (Class D) 4 pair UTP up to 100M, and
  • 5 GBase-T option will run on Cat 6 (Class E) 4 pair UTP up to 100M.
  • There is no release date yet

The concern, however, is that vendors could jump the gun by shipping pre-standard products ahead of standards rectification, complicating matters and slowing down the development of the pertinent standards.

rb-

Remember 802.11n? Pre-standard products? Given that there is no guarantee that systems built with components from the two groups will work together. Don’t jump the gun – waiting for the standard to solidify before buying into new 2.5G/5G Ethernet networking hardware.

For now, Dell’Oro Group analyst Alan Weckel told FierceCIO is that enterprises will probably be able to buy 2.5G/5G equipment starting in Q2 of 2015. 

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Batman Protects Data

Batman Protects DataBatman, the crime fighter who protects the streets of Gotham. Now he can protect your data. Mimoco has added Batman to its line of Mimobots, the USB flash drives that look, flashy.

Batman Mimobot

According to the New York Times, the USB crime fighter can hold 2 GB to 16 GB of data while sitting on your desk or plugged into your laptop. The Batman Mimobot comes with preloaded character-specific content, including wallpaper, screen savers, avatars and sound features.

Mimoco’s licensing deal with Warner Brothers includes Batman, Robin, the Joker, Catwoman, and a limited-edition Batman, clad in a vintage 1939 black-and-gray costume. Additional characters from DC Comics, including Green Lantern, Superman, and the Flash, are expected soon according to the NYT.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.