A new idea: the wireless ISP

Comdex wasn’t any thrill this year: call it the demi-Comdex, the mini-me Comdex. But one meeting made the entire trip almost worthwhile. I spoke to a couple of guys who are doing a fixed-point wireless ISP. The concept isn’t new, but their timing may be perfect.

And these guys, who are from a company called Slice Networks in Nebraska, may actually be ahead of a very big development: last week Intel, IBM and AT&T endorsed their concept with a new company called Cometa Networks that will roll out a new nationwide wireless network.

What is so new about it? You can read the entire essay here.

Read More
EMC, Microsoft’s latest enemy

Joe Tucci has been going around saying that EMC is going to become a software company, and with the acquisitions for Legato and Documentum, the CEO meant what he said. Now, with the acquisition of VMware, the storage vendor has a chance to really deliver on this software vision, and, in the process, it could give Microsoft some serious competition. Furthermore, the new acquisition puts the other two in perspective and could be the biggest news — and market opportunity — yet for EMC.

You can read the entire essay here.

Read More
Phishing for suckers

Most of us know by now not to give out our passwords, ATM PINs, or other secret information when requested by e-mail. But an increasing number of people are giving out that information, even those of us who should know better. What makes this doubly annoying is that the scam is an old one, and it has nothing to do with technology per se.

The technique is called phishing, and some very clever crooks use it.

You can read more of this essay here.

Read More
Dealing with the Blaster situation

Last month, some cretin Out There writes Yet Another Worm called Blaster that can infect whole networks at once. That is, whole networks of Windows computers who haven’t upgraded their operating system to incorporate the latest security patches from Microsoft. One of the side features of these infections was a planned Denial of Service attack that was supposed to be launched against Microsoft’s WindowsUpdate servers this past weekend.

So I start digging into the reality of this situation and find that buried in all this information is another weakness that isn’t widely publicized. One port that could be a problem is the port used by trivial file transfer, which happens to be port 69 for those of you that keeping track. This port wasn’t named by the feds as a target. The worm uses this port to move copies of itself to other machines. This is the port that you need to close off, as our own network administrators found out when someone brought their laptop in from home and infected our corporate network last week.

You can read more of this essay here.

Read More
Signatures of the Invisible, where art and physics meet

Back in New York, I took some time today to visit PS1. The place is an old school (hence the name) that has been converted into a modern art museum in Queens, NY. The place is quirky, and the art can be boorish to bland, and sometimes quite exciting. The show that really turned me on, and captured my imagination was one called Signatures of the Invisible, a collection of collaborative efforts between artists and physicists. 

 

I have always been interested in physics; indeed, it was my first major in college until I got more attracted to mathematics and computers. I was one of those geeky kids that memorized (most of) the periodic table of the elements and knew all the subatomic particles by their various characteristics. Well, I didn’t do sports, so I had a lot of time on my hands. Most of that knowledge is long gone from my cranium, but I still remember that Uranium has an atomic weight of 238.

Anyway, what was on display at the museum (and only for the rest of this month, so act fast if you want to see it) is a wide variety of media and approaches that combine the two fields in new and very unusual ways. One of my favorites was a piece from Paola Pivi that looks like a bunch of wires suspended between two very thick metal plates about 7 feet tall. Upon closer inspection, the wires have small pieces of metal that are attracted to the static electricity of your body. When you get closer to the piece, the metal pieces eerily pivot and point towards you, and the pointers will follow your hand (or whatever body part you can get close to the thing) as you move around it.  When I first saw the piece I went looking for the power cord, and then enjoyed the explanation that was in the video loft about it.

Speaking of videos, here are several that I found fascinating, including a couple of documentaries featuring some of the physicists that are searching for new subatomic particles at CERN (outside of Geneva) and Fermilab (outside of Chicago).  The film makers were able to capture their passion about their search — which can be very mundane and monotonous — and still make an engaging movie. Well, maybe engaging to someone who actually knows the difference between a neutrino and a quark, but many of you would also enjoy these short films.

Mel Chin had a display that looked like an indoor cultivated garden. He was showing what “hyperaccumulating” plants could do to remove toxins from the soil, and the museum promises that the metals removed from the dirt will be formed into a pencil at the end of the exhibit. There was a video that was part of the art installation that just featured a woman slinging a lantern on the end of a rope around her: it didn’t strike my fancy much until I saw an explanation in the video loft about the underlying physics. And then there are the dissembled parts of the atom-smashers (they are called particle accelerators) themselves, on display as high art. Anything with a couple of circuit boards was bound to get my juices flowing, and these pieces of scientific gear were just beautiful by themselves.

So what does this have to do with the Web? Astute readers will recall that Tim Berners-Lee got started at the CERN laboratory (he is now at MIT), where he built the first Web browser and put together the rudiments of the HTML language and HTTP protocols that are part and parcel to every Web site today. A nice way to wrap things up for me, and to show that the guys that are so concerned with understanding these ultra-small pieces of matter can work together with artists to produce such beautiful and thought-provoking pieces of art.

If you would like more information about the exhibit, ps1.org’s site does a mediocre job explaining things.

Read More
Sam’s SAN Diary

I helped edit a series that ran in VAR Business called Sam’s SAN Diary. It is written by Sam Blumenstyk, the technology operations manager at Schulte Roth & Zabel, a Manhattan law firm that’s typical of midsize companies in general. Blumenstyk was in the midst of a major upgrade to his company’s storage infrastructure, and built his first storage-area network (SAN). I asked him to keep a diary of the trials and tribulations, and he has graciously agreed to share this with VAR Business readers. Each week you’ll hear from Sam about how he assembles his solution, which vendors he favors, how he decides between using VARs or direct-vendor reps at various stages of the project, and the ups and downs of implementing the storage technology.


Sam Blumenstyk

This Web-only column is a unique opportunity for VARs to learn how to break into the SAN marketplace and understand the mind of the customer, as well as to read in near real-time the forces and decisions that are faced by a typical IT manager. Sam’s diary is also a great way to understand the storage marketplace as well as some of the challenges that customers have to overcome to install their first SAN. — David Strom

Here is a link to the various episodes as Sam installs his first SAN.

Read More
Managing wireless networks for the enterprise

The great thing about wireless networks is the freedom to
roam about your campus, home, or office. The trouble is this
freedom comes at a price, and enterprise network
administrators are finding out that managing all this
mobility is messy and fraught with multiple complicating
factors, making wireless networks more of a burden than
dealing with wired connections.

The reasons have to do with a combination of poor tools and
the ad hoc nature of wireless networks themselves. The good
news is that many vendors are stepping up to the plate with
new products that can make some of this pain go away.

I got to see some of these products as one of the “Best in
Show” judges in the wireless category at the Networld+Interop
show in Las Vegas.

You can read the entire essay here.

Read More
Anatomy of a Web hack

I asked Caleb Sima from SPI Dynamics, a Web application and security assessment software firm, to give me some insights about breaking into Web sites. Caleb has a pretty cool job: he gets paid to do this, in the process demonstrating the need for tools such as his employer sells as well as the various weaknesses of people’s sites. When he came to CMP last fall, he was inside our own Web site and reading stuff that he shouldn’t have had access to within a minute or so. Fortunately, our Web folks have tightened things up, but you may not be so lucky.

I asked Caleb to give me an idea of how he manages to find these vulnerabilities so quickly, and he came up with a few suggestions. If you understand how Web servers work and how they have directory structures and input forms just like your computer on your desktop, you can get pretty far — even without much other specialized knowledge. To give you a flavor of this, I submit his prescription for locating a web application attack vulnerability called cross-site scripting.

You can read more of this essay here.

Read More
Oldest living software application contest

In another post, I asked you all to send in your own entries to qualify for the “oldest living software” application. Needless to say, I got some great entries. I can now announce the winners.

Before I do, I should point out three Web sites that might be of interest to those of you that are exploring the ancient era of our industry. Dell in fact held its own oldest existing hardware contest a few years ago and uncovered a vintage Altair from 1976 that was since donated to The Computer Museum.

Two other Web sites are digibarn.com and oldversions.com. The former is Bruce Damer’s one-man computer museum, while the latter maintains links to older versions of some common software tools that may be preferred to the bloatware and feature-rich upgrades that have followed them.

Okay, enough scene-setting. The winner in my little contest is a general ledger accounting program that has been in use for nearly 25 years and was originally written for the Radio Shack TRS-80 in 1978 and was mass-marketed in 1979.

You can read the description of the other winners here.

Read More
Windows NT, Microsoft’s secret enemy

Microsoft’s latest Windows software this year isn’t all about the desktop, it is a new version of Windows Server 2003 that will be the first in several years. While it is conventional wisdom that Linux is its biggest competitor, my thought for today is that Linux will have to take a second seat to the real challenge: getting people to convert from NT. Surprise: Microsoft’s secret enemy is inertia, or itself.

At our XChange conference last week, a representative from Redmond stated that there are at least 4 million NT servers out in the wild that are ripe for the upgrading. (And that isn’t counting all the ones on Microsoft’s own network either. Or maybe it is.) Our own surveys done for the upcoming State of Enterprise Spending issue at VARBusiness show that enterprises are still moderately investing in NT, holding about the same market share as Linux at 37 percent. No matter whose numbers you trust, that’s a lot of NT lying around that no one is too thrilled about having to touch going forward.

You can read the entire essay here.

Read More
1 186 187 188 189 190 193