This isn’t your son’s PS3

ps3clusterA story around the InterWebs today about how a collection of computer researchers have been able to create rogue Web certificates got me interested in one side note of how they did it — using a cluster of 200 Sony PlayStation 3 gaming consoles at a special lab in Switzerland (pictured at left). I have written about this before, how the 9-core processors inside the PS3 can be used for very computationally intensive tasks. Indeed, the researchers said in their paper that if they had used ordinary Intel PCs the task would have taken years to complete rather than the days that it took to construct the rogue cert:

“We have found that one PlayStation 3 game console is equivalent to about 40 modern single core processors. The most computationally intensive part of our method required about 3 days of work with over 200 game consoles, which is equivalent to 32 years of computing on a typical desktop computer.” 

You can read a more detailed analysis of what they did here by Rich Mogul.

They aren’t the only ones clustering PS3s. The fastest computer in the world uses a custom collection of Cell processors that IBM put together for one of the US national labs. Granted, this isn’t quite the same thing as going down to BestBuy and picking up a console, but you get the idea that there is now more processing power in the graphics engine than the CPU itself of most modern computers. Given the demands that many video games have on redrawing and rendering, this makes sense.

Hiding your AV gear

HotLink remote control systemIf you are like me and have spousal design approval on everything in your home, then you are going to be interested in how you can hide your stereo gear and still use your remote controls. I have tried two different solutions, the $100 Hot Link Pro from MicroSmith and the $35 Next Generation Remote Control Extender which is sold by Amazon.com. What is the difference?

There are two different approaches. The NextGen replaces the batteries in your remote with their own rechargeable ones that also have an RF radio emitter. The Hot Link uses your existing remote controls. If you don’t have the ability to do everything with a single remote, then go with the Hot Link.

For another thing, the Hot Link works on my AT&T Uverse box, the NextGen doesn’t. NextGen comes with a single IR emitter – you have to buy an add-on to get more. Hot Link comes with six emitters for your different components. You position the sensor cable of the HotLink outside your equipment cabinet; the NextGen has an antenna and sits completely concealed. Neither have very detailed instruction manuals although I was able to get both working within a few minutes. 

How to start your own mailing list

Here is how to become an Internet publisher on less than $75 a year using your own domain name and the Mailman hosting provider EMWD.com. This screencast video shows you the five simple steps that you need to set things up.

[vodpod id=Groupvideo.1916849&w=425&h=350&fv=file%3Dhttp%3A%2F%2Fweb26.streamhoster.com%2Fdavidstrom%2Fstromcasts%2Flesson%252019%2520mailman.flv%26amp%3Bautostart%3Dfalse]

more about "How to start your own mailing list", posted with vodpod

Slow down!

Do you get the feeling that the pace of life is accelerating too quickly for you? I do. I think it all started with instant coffee and TV dinners. In the tech world, there was email because we couldn’t wait for telephone calls, or snail mail to be returned. (Don’t you just love that term? Talk about slow!) But that wasn’t fast enough, so we went to Instant Messages. But even those that take more than a few minutes to answer aren’t acceptable, and so now people text each other from their cell phones because they can’t wait until they are sitting in front of a computer.

We say that Web pages are called slow to load if they don’t appear onscreen in 20 seconds or so before we hit the reload key. And it was too hard to build Web sites from scratch, so we have WordPress et al. to make building blogs a snap. But even blogs are too much work, so we now have Twitter to send short bursts of information out to the world. Soon we will have nanoblogs, one-word missives that we can transmit to millions of people. Pity that we have become so pithy. The devil is in the details. 

Videos that are longer than three minutes are too long to watch. We have Tivo and DVRs that can fast-forward automatically through commercials, because no one wants to watch them in real time anymore anyway – who has the time to wait for a program to start at the top of the hour? It seems so quaint now that was the only way we could all see “must-see TV” back in the day on our black and white sets that were encased in our cherrywood furniture.

We have video Skype calls for instant conferencing and impromptu meetings, even with people that are in the same office, because we can’t spend the time to get up from our cubicles and walk down the hall. Software “builds” used to be created weekly, then daily, now they are done hourly, and even that isn’t fast enough for the always-connected, hyper-broadband generation.  It used to be enough to carry around a few megabytes on a flash drive, now we can take our entire digital repository and listen to music and videos too.

And don’t even get me started about social networks, or online dating, or even online breakups (I don’t need to know anything more about Jimmy Wales, puh-leeze!).

Maybe it is time to start slowing down. Take a few minutes to re-read that email before hitting the send key and regretting what you said in haste. Call someone on the phone in real time, and turn away from your screen when you are talking to him or her so they have your undivided, single-tasking attention. Interact with someone in your office by getting up out of your chair and visiting with them, not to waste time or shoot the breeze, but to get a reaction and some face-to-face feedback. 

Have a nice holiday break, if you are reading this this week. And a great New Year’s!

The Art of Product Management

I’ve known Rich Mironov through several jobs as a product manager and marketeer and he is one of the sharpest guys that I have had the pleasure of working with. Add a soupcon of humor and a delightful daughter and wife to the mix and we have had some fun times outside of work as well. His book called The Art of Product Management is out and if you are in the high tech product business you might want to get yourself a copy. He has lots of practical, succinct advice on how not to repeat the many mistakes of the past, and how to quickly tune up your product marketing and strategies for success. It is well worth the $22.

SecurePC may be too costly for what it delivers

Is $600 for a “netbook” too much to spend these days? Apparently so. I tried out the SecurePC from 01com.com and while a nice package, the price is a bit steep considering the competition.

The idea behind the SecurePC is a nifty one: put together a stripped-down version of Windows XP that just can connect to the Web and do nothing else. You do not have access to any local storage, so your PC can’t get infected from malicious Web sites or emails. You can’t download any programs. If it lives out on the Internet, you can run it – the usual Flash and Java add-ons come with the machine. Otherwise, forget it.

The notebook runs Intel’s Atom processor, so it is quiet, cool, and compact. The screen is bright but isn’t going to win an awards for size – it is a 10 inch diagonal and can run an external video monitor in the odd resolution of 1280×960 because of its form factor, I guess. And it comes with a solid state hard drive so there is one less moving part and heat source to worry about.

I liked the design and feel of the machine’s hard plastic case and they way it boots up almost instantly – it takes longer to find your wireless network than it does to bring up the overall system. The keyboard is a bit cramped for me, particularly the comma and period keys that are somewhat squished together. And it comes with three USB ports, although I am not sure what you would connect to them other than an external mouse. If you try to plug in a thumb drive, you aren’t going to get any files off it. The SecurePC does support USB 3G broadband modems, but I didn’t test any.

You can access network shares via the wired or wireless interfaces, but again, I am not sure what you would do with the files when you see them, unless you could run a auto-executing virtual machine session across the network. To get an idea of how stripped-down this OS is, you open up a rather sparse Control Panel. There isn’t much you can do, which I guess is good if you are getting this PC for grandma.

The disk storage is limited, and I had to play some games adjusting the virtual memory settings that would also allow enough room for temporary files: InTouch could spend some more time tweaking these setings. Another drawback is that you can’t upgrade your OS when Microsoft issues the inevitable patches since you have to wait for InTouch to release a new image of the machine’s innards.

If you are paranoid and can live without any applications – other than IE – than this is worth a look. It could be the perfect kitchen computer, or a second machine to do a lot of Web searching or Webmail on. The only real issue I have is the price. For $350, I can get a Dell, Acer, HP mini (or others here) that has a 10 inch screen and a full version of Windows and larger hard drives, and for the price of the Secure PC I can get a full-strength laptop with a 15 inch screen. And to make things more complicated, Radio Shack is selling netbooks for $99, plus the cost of a 3G broadband wireless plan from AT&T for $60 a month for a two-year contract. 

How to stop leaking data

One of the great things about the Internets is that it provides universal connectivity between your desktop and the world. But that is also a tremendous weakness and security professionals often lose sleep over how easy it is for a rogue employee to email a friend – or even his private Webmail account – their entire customer list or other confidential information.

There have been a number of products to try to track or block leaking data, and this week I was testing one of them for my WebInformant.tv video screencast series — TrueDLP from Code Green Networks. The idea is fairly simple: you install their appliance on your network, point out your most sensitive data, and then it watches over your packets and sees what is leaving the premises. It doesn’t take that long to setup and install, once you figure out what it is doing and what you are doing.

The tricky part is figuring out exactly what is your most sensitive data, and being able to focus in on it in a way that the product can identify. It comes with dozens of various templates to be able to recognize social security numbers, or names and addresses, or stock symbols, or other kinds of well-formatted data. But the real plus is being able to handle unformatted data, such as a memo about a customer’s preferences that is just a Word document, for example. Code Green can connect to a SQL database and directly handle the query syntax to select particular data types, and it can also connect via WebDAV to Sharepoint servers or other document repositories too. Once you find your data, you create protection policies and tell the appliance what to do – whether to just log the violation or actually block the activity.

You also need to make sure that you are matching everything properly, because the last thing you want to have on your hands is a series of false positives that you have to chase down. You can also set up fancier things, such as automatically requiring emails between two places (such as your office and a partner) to go out encrypted. Speaking of encryption, they work with the Blue Coat Web proxies so that even if someone is using SSL connections to talk to their Webmail accounts they can take those packets apart and see what someone is doing. That is pretty spooky, but hey, you have been warned!

There are other things that the product does, such as being able to detect content on removable USB thumb drives, or even block their usage entirely. This is the way of the world: as these drives get beyond 64 GB (yes, gigabytes), they are more of a threat for someone to just literally take an entire database out the door in their pocket. I recently ran up against this when I was in my bank trying to provide documentation for a loan. I had brought a CD, a USB thumb drive, and had saved the documents on my Google account just for good measure. Because of the bank’s endpoint security lockdown policies, I was 0 for 3 and had to send them the old fashioned way, by making paper copies, once I got home. At least it was nice to know that they had protected their employee’s PCs.

The interesting thing is what happens after customers get their hands on this Code Green product. Lawsuits typically ensue, so to speak, because often the network administrator finds someone is doing something that they aren’t supposed to be doing.  One of the product managers I was working with told me that this usually happens within the first week of the product being put into production. Given that the basic price of the product is ten grand, I figure that is as close to instant ROI as you are going to get these days, considering the cost of most litigation.

So take a gander over at WebInformant.tv and watch the four-minute video of the Code Green appliance. It is a very innovative way to detect and prevent data leaks and well worth a closer look.

Stopping Data Leaks with Code Green Networks

True DLP
Code Green Networks Inc.
http://codegreennetworks.com

385 Moffett Park Drive, Suite 105
Sunnyvale, CA 94089
(408) 716-4200

Summary:Data loss protection is still a new field, but Code Green Networks brings a comprehensive solution to stopping leaks of confidential data to unauthorized users. Is your IT leaving with employees that are getting downsized? Is your customer list now the property of one of your competitor’s? Then you might be interested in the latest data leak prevention appliance from Code Green Networks. Called True DLP, it consists of hardware and software tools that can detect when critical information is being copied from your network to a Web mail account, a removable USB thumb drive, or placed inside a document that is emailed as an attachment, even over an encrypted connection or hidden inside a compressed file ZIP archive.

Code Green works in conjunction with the Blue Coat Web proxy (to decode SSL traffic) and a series of email encryption products from Voltage and Cisco.

Requirements: Just about any network and server configuration is supported. More monitoring and control is available using Windows-based agents for both servers and desktops.

Price: $10,000 for 50 users, more for larger networks. Maintenance fee is an additional 18% annually, and agent support is an additional 20% fee

Pros:

Both structured and unstructured data protected

Automatically encrypts sensitive outgoing data
Straightfoward Web management interface

Cons:

There are a number of ways to install and configure the product, depending on your own network connectivity and which servers you choose to protect

Only Windows endpoints supported with its agents.

[vodpod id=Groupvideo.1839794&w=425&h=350&fv=file%3Dhttp%3A%2F%2Fweb26.streamhoster.com%2Fdavidstrom%2Fcodegreen%2Fcodegreen.flv%26amp%3Bautostart%3Dfalse]

more about “Stopping Data Leaks with Code Green N…“, posted with vodpod