Categories
Uncategorized

By popular demand: The TCP/IP layers, featuring cats!

osi network layer cats

The “OSI Network Model, Featuring Cats” picture was a hit on Twitter; I have pages and pages of retweets. Who knew there was such a demand for layered diagrams featuring stacked felines?

Of course, OSI pretty much remained a model, mired in bureaucratic turf wars and interminable committees, and was eventually usurped by TCP/IP. While considered more hackish by academics and other standards hounds at the time, it was actually implemented, and it’s the reason you’re enjoying all these networking cat pictures right now. TCP/IP has four layers as opposed to OSI’s seven, and luckily there just happens to be a cat picture online with 4 stacked cats:

tcp-ip cat layers

The photo is perfect, right down to the homemade pile of cardboard boxes, which do a great job of symbolizing the JFDI (“Just Effing Do It”), “worse is better” approach that TCP/IP’s implementors. It contrasts nicely with commercially-made plastic stacking baskets from the OSI cats photo.

If you’d like to know more about the differences between the OSI and the TCP/IP approaches, take a look at the IEEE Spectrum article, OSI: The Internet That Wasn’t. You might also be interested in Alex Martelli’s Google talk, Good Enough is Good Enough.

Categories
Uncategorized

For your next presentation on networking: the OSI model, featuring cats

seven layer cats

Click the photo to see the source.

While doing my daily rounds of amusing pictures to use in blog posts, I found a photo of cats in stacking baskets. Since I work in the field of mobile devices, I’m never far from the topic of networking, and immediately counted the layers of cats — seven! If you’ve ever taken a networking course that covered concepts and theory, you might have thought of the same thing I did:

osi network layer cats

Feel free to use this to put a little amusement into your next presentation on networking.

Update

By popular demand, I put together a photo of TCP/IP’s layers with cats:

tcp cats preview

Categories
Uncategorized

BYOD news roundup: BYOD and the law, simplifying your BYOD security policy, and BYOC?

byod-news-roundup

Today’s BYOD news roundup takes a look at some of the legal wrinkles that come up when an organization lets its employees bring their own devices for work, some ways to simplify your BYOD security policy, and the fact that when people bring their own devices, they bring along with them their own cloud app accounts, something that many IT departments have ignored.

BYOD and the law

byod-and-the-law

The recently-held Enterprise Connect Orlando 2014 conference featured a session titled Assessing the Legal Issues Around BYOD, which looked at the  sort of legal exposure that companies with BYOD programs could face. Among the risks and potential liabilities covered in the session were:

  • Lost or stolen devices. The top concern in InformationWeek’s 2013 State of Mobile Security Survey and IT directors everywhere, a misplaced smartphone or tablet can give a malicious party the “keys to the kingdom”, either in the form of sensitive data or unauthorized access to corporate resources. The former can be dealt with through virtualization technologies that keep sensitive data in the cloud and off the device, while access control technologies such as mandatory passcodes  can help prevent the latter.
  • Mis-wipes. Many companies rely on Microsoft Exchange ActiveSync or IBM Notes Traveler for the ability to remotely wipe employee devices, but they’re blunt tools that completely wipe the device clean of all data, both corporate and personal. A number of EMM and containerization solutions make it possible to limit the wipe to just the corporate data, preserving personal information, including irreplaceable stuff such as personal photos (I’ve seen a number of people whose only copy of their recordings of their child’s first steps or words live on their smartphone). Still, there’s always a chance that a remote wipe may be done in error or extend to include personal data, which may provide grounds for a suit. Users need to be educated about such possibilities and the importance of regular backups.
  • Surrender for ediscovery. Employees have to be informed that they will be required to surrender their mobile devices if they are required for electronic discovery — the process of identifying and collecting and producing electronically-stored data in the course of an investigation or lawsuit. Some organizations provide employees who have surrendered their devices for ediscovery with a “courtesy device”.
  • “Texting while driving”. An employee who gets into a car accident while using a mobile device for work — a business call, text message, or other use of the device — may end up making the employer liable, as it happened on company time and the employer is the involved party with the deepest pockets. The damage awards have been in the millions. Everyone on the session panel recommended an outright ban on mobile device use while driving, but as the article puts it: “About the best we can do in the mobility policy is include guidance regarding the safest ways to avoid all distractions while driving, point out which situations are most potentially hazardous, and suggest techniques for avoiding them.”

Other points made in the session:

  • Privacy. MDM helps mitigate a number of problems with BYOD, including legal ones, but many users resist it out of fear that it will let IT view personal information. Employers should make clear what IT can and can’t see on employee devices with MDM software, a topic we’ve covered earlier.
  • Penalties. Mobile policies are just words if the penalty provisions in them aren’t enforced, and in court, advertised but unenforced penalties will work against you.
  • Policy, buy-in, and knowing the limits. Your best defense against all sorts of BYOD trouble, legal and technical, is a combination of policy input and buy-in from various departments (legal, HR, security, line of business managers), and recognize the limits of enterprise mobility management technology.

Mobile technology as we know it is still a relatively new field — less than a decade old — as is the law surrounding their use. There aren’t many precedents yet, but with good planning, clear communication of policy, and judicious use of management technologies, you can avoid setting one of them.

5 ways to simplify your BYOD security policy

simplify-your-byod-policy

Business News Daily reports on PJ Gupta’s (CEO of Amtel, a mobile security solutions firm) five tips for success with BYOD security:

  1. Protect enterprise data and apps. This is the primary goal of workplace BYOD management, and requires both security policies and technologies.
  2. Secure the device. Mobile devices use for work are both stores of valuable corporate data and access to even more online. You need to be able to manage access to the device as well as data both on the devices and accessible via the device, and be able to disable the device if necessary.
  3. Ensure personal privacy. While control of BYOD devices is important, the device, along with some of the data and use cases, is the employee’s. Limit location tracking to case where the device is misplaced or stolen, avoid rigid policies in blacklisting and blocking apps, and ensure that personal data is not wiped from the device without employee consent and only when absolutely necessary.
  4. Use enterprise mobility management solutions. A good cloud-based EMM solution makes enrollment easy, protects against all manner of threats, and stays out of the user’s way.
  5. Monitor and take action. Device management works best with vigilance: real-time monitoring of data access and audit trails, automatic alerts, and analytics can reveal threats that can be acted upon before the situation becomes much worse.

BYOC?

bring-your-own-cloud

Another recent conference, the Cloud Innovation Forum in Saratoga, California, a panel discussion covered what its panelists felt was a new challenge: BYOC — Bring Your Own Cloud. As people have been bringing their own devices for work, they’ve also been using their own accounts with cloud-based applications and services. While IT departments have focused on the devices, the applications on them, as well as the cloud-based computing and storage resources those apps that they use also create their own issues, and they need to be reckoned with.

The article concludes with this paragraph:

When it comes to security, this means moving more of our resources out to applications rather than on physical infrastructure as “a lot of applications are in the cloud and it’s hard to manage security on the device in this BYOD world,” according to [panelist] Rai.

this article also appears in the GSG blog

Categories
Uncategorized

One great thing about those old iPhone connector plugs…

those old iphone connectors

…is that they established a pretty good grip on the phone, allowing for recharging in situations that would otherwise be impossible:

old-school iphone connectors

I’d still put something soft and cushiony under that dangling iPhone, just in case.

this article also appears in the GSG blog

Categories
Uncategorized

This week’s Tampa Bay tech meetups

meetups

I’ll be at a couple of Accordion Bay tech meetups tomorrow, and I’ve compiled a list of upcoming area meetups as well…

Afternoon: Open Studio Hours at Microsoft

Local Microsoft Tech Evangelist Joe “devfish” Healy is hosting open studio hours at Microsoft’s Tampa offices (5426 Bay Center Drive), from 10:00 a.m. to 6:30 p.m., where people can drop in, visit, work on a project, socialize, play board games (Joe apparently stand undefeated at Carcassone), and do general co-work-y stuff. At 6:30 p.m., it turns into a board games meetup. Here’s the meetup page for this get-t0gether.

I’ll be there in the afternoon to say “hi” to Joe and get some work done, after which I’ll head to…

Evening: Suncoast iOS Meetup at American Business Center

The Suncoast iOS Meetup is having its meetup at American Business Center (8340 Ulmerton Rd. Suite 200, Largo) at 7:00 p.m., and the topic is “App Showcase and Open Discussions”. Here’s the meetup page for this get-together.

Other upcoming Tampa Bay area meetups include:

Categories
Uncategorized

Dispatches from the wireless wars: the fights over customers and spectrum

wireless-wars

With smartphone ownership in the US hitting nearly 60% at the start of this year, and data usage among those smartphone users climbing, it’s only expected that the war between wireless carriers is heating up. In this installment of our regular look at the wireless carrier industry, we provide an introduction to the two major fronts what they’re fighting over: customers and spectrum.

The fight for customers

people-with-smartphones

The rise of the smartphone raised the stakes for wireless carriers, and as more people use them more often, and as more devices become wireless network-enabled, the carriers’ battle for your business has become more intense. In the open, the war’s about customers, as you’ve likely seen through the recent carrier advertising campaigns and promotions, many of which have been driven by T-Mobile’s recent “Uncarrier” approach. If you look at Pew Internet’s latest figure on wireless-enabled device ownership in the US (they update them regularly; the ones we’re citing are from January 2014), you can see why the fight’s becoming more intense:

  • 90% of American adults have a cell phone
  • 58% of American adults have a smartphone
  • 32% of American adults own an e-reader
  • 42% of American adults own a tablet computer

big-4-wireless-subscribers

Click the graph to see the source.

Currently, AT&T and Verizon are the two giants of the US wireless carriers, each about the same size, with AT&T at 110 million subscriptions and Verizon at 103 million. The next two, Sprint and T-Mobile, are about half the giants’ sizes, with 54 million and 47 million subscribers, respectively. Masayoshi Son, CEO of the Japanese telco Softbank and Chairman of Sprint, has announced that he’d love for Sprint to purchase T-Mobile, thereby creating a carrier whose subscriber base would be on the same order of magnitude as the Big Two. “With scale merit,” said Son in a recent Sprint earnings call, “we don’t have to settle with No. 3. We can compete fiercely.” It’s an audacious plan, but most pundits say that it’s not likely to get approved by US regulators.

The fight for spectrum

radio-waves

Behind the scenes, the carriers are fighting for something else: spectrum — a range of radio frequencies assigned for use by wireless carriers for the transmission of voice and data. Each radio frequency in these bands is capable of carrying a certain amount of data at any given moment, and as more wireless users go online, the frequency becomes more crowded. This means that more users make use of a given frequency, it has to be divided among more people, giving each user a smaller “slice”, slowing data transmissions.

Luckily for the carriers, a block of frequencies will soon become available. The frequencies, which are in the range of 600 megahertz, are currently used by television stations, and the FCC is “voluntelling” the stations to yield them, and if they don’t, may move them to other frequencies. These frequencies are so desirable that the industry nickname for them is “beachfront property” because of their properties: they travel farther than radio waves in the frequencies currently used in the US (850 megahertz and 1900 megahertz), pass through buildings, hills, and vegetation better, and require fewer towers. Simply put, the 600 megahertz band offers better range, less dropped connections and is cheaper to operate.

This band of frequencies will soon be made available via auction to eligible parties. As of August 2012, AT&T and Verizon own about three-quarters of the lower-band frequencies, with Sprint owning 12%, and T-Mobile owning less than a percent. Sprint and T-Mobile’s radio spectrum is largely in higher-freqnecy bands, which can carry more data, and serve them well in population- and tower-dense city areas. However, corporate accountants view the lower frequencies as more valuable assets; in fact, Verizon’s accounts have their frequencies in their books as worth more than all their properties and equipment combined.

There’s considerable evidence that the auction, as currently set up, favors AT&T and Verizon, much to the chagrin of T-Mobile and Sprint. The stakes are high enough that the carriers have been spending considerable sums not just on lobbying, but influence. American University professor James Thurber, who’s been studying lobbying for three decades, says that the carriers have likely spent as much as $80 million — twice their lobbying spending — on behind-the-scenes promotions in which they give cash to PR firms, think tanks, “grassroots” and “toproots” organizations, academics, and other influencers, all in order to shift perceptions in their favour. This less-seen battle is covered in a recent Slate article that says that the future of wireless communication may be decided by a massive influence web of lobbyists, think tanks, and academics who are paid for their opinions.

this article also appears in the GSG blog

Categories
Uncategorized

If conference calls happened in real life

conference-calls-real-life

Our line of work puts us right in the middle of the mobile and telecom industries, so it’s only natural that we work with a number of employees, suppliers, partners, and customers not just across the US, but around the world as well. As a result, a daily part of a lot of our lives — mine included — is the conference call.

Conference calls have many advantages, including allowing global teams to meet and collaborate, reducing travel time and costs, and creating the kind of “work anywhere, any time” flexibility that fits busy lives. They also have their disadvantages, which are sent up hilariously in this video by the comedy film duo of Tripp and Tyler, titled A Conference Call in Real Life:

this article also appears in the GSG blog