Net Neutrality May Survive

In a May 2014 posting we reported that the Chairman of the FCC, former Comcast lobbyist Tom Wheeler, was going to end net neutrality, and allow ISPs to treat different net content providers differently  and to charge them different rates—-essentially allowing providers to buy their way into premium “fast lanes  of service.  This would have a chilling, if not deadly, impact on the diversity of content and innovation of new content.

Today, President Obama urged obama-nret neutralitythe FCC to implement the “strongest  possible rules” to protect a free and open Internet.”   Perhaps his work this week with China on their closed Internet problem  inspired him to make sure that our freedom to produce and distribute content on the Web is maintained and protected.

 

Hopefully, this important part of our Freedom of Information will not become a partisan political football

 

 

 

 

Bill Patch 12/1/2014

Manufacturers Need To Improve Product Security

Business Insider posted an article on May 19th, reporting that Cisco CEO and Chairman, John Chambers, had written a letter to President Obama, asking him to stop the NSA from inserting  monitoring devices into Cisco equipment.  :

 

john chambers

 

The article included a copy of the letter, which is dated May 15th.   The timing of the letter is curious.  It says it is in response to photos which went viral last month after being published in Glenn Greenwald’s new book, “No Place to Hide”.  The photos show NSA operatives in 2010  opening packages of Cisco equipment and inserting devices into the equipment.

Last week Cisco also released  a quarterly earnings report, which showed orders were down in their developing nations region—Down 7% in the BRIC  Region  (Brazil, Russia,  India, China) , and down 13% in Mexico.  While  the publication of the photos certainly can’t be helping Cisco’ sales in the developing nations, Chambers’ letter stops short of making any specific link between the photos and the quarterly results. Chambers does point out the negative impact of the agency’s actions:

We simply cannot operate this way, our customers trust us to be able to deliver to their doorsteps products that meet the highest standards of integrity and security.”

He’s right—customers trust Cisco to produce and deliver products that are safe to use; but that’s Cisco’s job, not the government’s. By now it’s clear that the pursuit of national security has led the NSA to engage in practices that  most people deem to be excessive and intrusive.  The leaders of most of the largest technology companies have written similar letters  on the subject. (  See:  http://www.washingtonpost.com/business/technology/tech-executives-to-obama-nsa-spying-revelations-are-threatening-business/2013/12/17/6569b226-6734-11e3-a0b9-249bbb34602c_story.html).   And as computer technology becomes even more ubiquitous with the coming IoT  (Internet of Things), security of the equipment is becoming increasingly important.

Also this week, five Chinese military officials were charged with hacking into the computer systems in U. S. firms, to give competing Chinese companies an advantage. Catching the five people involved was a great example of how the government can help secure our information technology resources, but equipment manufacturers such as Cisco need to design and deliver stronger, safer, more secure products.  Cisco needs to design routers that are smart enough to detect when an unauthorized part has been installed . All products need to have extensive self-monitoring capabilities, to detect intrusions or tampering, and to alert when the   unit is being used outside of expected ranges of processing ( for example, PCs that have been taken over by viruses and are being used for spam campaigns. or Denial-of-Service attacks.

*     *     *

We don’t have to accept a technology infrastructure that includes pervasive hacking as a given.  We need to expect–and demand –that hardware and software  providers make products that protect themselves—and us.   It should have been impossible for anyone—even the NSA– to open  and tamper with a product without being detected by the product itself.

Bill Patch    05/20/14     

 

 

 

 

 

 

 

 

 

 

 

 

 


FCC Ends Net Neutrality

Screen shot 2014-05-15 at 3.08.47 PM     On Thursday this week the FCC, led by former Comcast lobbyist, Chairman Tom Wheeler, proposed new rules that permit ISPs to charge content providers a fee  to get faster and more dependable service  than the other content that is being processed.    Netfix has already paid fees to both Comcast and Verizon.  This subject  gets complicated quickly, but what it comes down to is that content providers who have lots of money and lawyers will be able to get preferred service from the ISPs,   who  have a monopoly on the “last mile” connection to our homes and offices .    Comcast’s acquisition of Time Warner, which includes the old ISP AoL, will concentrate even more power in Comcast’s hands to leverage payments out of content providers.  Verizon, which was formerly Bell Atlantic, which was from your friendly old Ma Bell monopoly, is filled with managers and executives who know how to use monopoly power to manipulate markets.    At its simplest level:  If one party–or group of parties –can buy  preferred service from the ISPs, then other parties, who cannot pay the fees, will get degraded service.  On any given evening, your Netflix movie may be streaming quickly and clearly, but your Massively  Multiple Player world game may be stuttering, crashing and buffering.With this kind of power and control, the ISPs will be able to dictate  who can start up a content-proving service.  Facebook and You Tube are just a couple content providers that probably would not have made it if their service from the ISPs was slower and less dependable than the other content providers.    The days of a “free ”  Internet are over, if this FCC ruling stands.

 

 

Bill Patch

 May 15, 2014

SmartWatches Still Forecasted to Be a Huge Market by 2018

 

 

Screen shot 2014-05-01 at 4.18.40 PM

 

In September 2013, when Samsung and others had  first announced their wearable smartphone products (see our posting dated 09/12/13), the price was $300 per unit.      Business Insider Intelligence at that time was predicting the market for smartwatches would be $9 Billion by 2018.  We postulated that $300 per unit was a prohibitively high price, and doubted the unit volume in the BI forecast.   BI has now released a new market forecast, and it is based on an average per-unit price of $100.Nevertheless, the total market forecast remains constant at $9 Billion.    And now they’re beginning to talk about the importance of “attach rates,”  which refers to how many smartwatches can be sold as an extension of  its smartphone. ( Hardware manufacturers used to focus on he attach rates for maintenance agreements, especially on PC products, which had thin margins.)    People seem to dislike the bulky  size of the smartphones, so newer products will have smaller screens.  This puts  pressure on the development of apps that fit the smaller screen, so we may see a trade-off ratio of size and price versus functionality, and  the new cheaper models may not have enough value to justify even the  $100  price.  We’re still skeptical.

IoT Appliances Hacked

IoT ImageProofpoint, an Internet security firm, has announced the first reported incident of a security problem with connected, “smart,”  appliances, which are proliferating in the growing “Internet of Things (IoT).”   In this case hackers broke into over 100,00 consumer appliances, including  home-networking routers, connected multi-media centers, TVs, and at least one refrigerator, to send over 750,00 malicious emails during the period from 12/23/13 to 01/06/14.   The appliances were relatively easy to hack because they were set up poorly and/or used  the default passwords that came with the device (never a good idea).  The Proofpoint News Release stated,” As the number of  such connected devices is expected to grow to more than four times the number of connected computers in the next few years, proof of an IoT-based attack  has significant  implications for device owners and enterprises.”   Yes… “Significant implications, ”  indeed…IoT networks need to have security.  Companies like Cisco need to provide security products and services for home and enterprise networks, and consumers need to use them.  Systems can include  monitoring software.  IoT products can be truly “smart,” and they can monitor themselves and provide security alerts.  If users and providers  include  security as a priority for their IoT systems, the risk of an IoT installation will be no worse than the average computer, and probably better than the average mobile device.

 

Google Makes a Strong Play into the IoT

In related news, this week it was reported that Google bought an IoT company, Nest Inc., for $3.2Billion.  Nest was founded by Tony Fallon, who is generally given lots of credit for the design and development of the iPad while he was at Apple, The company makes a smart thermostat and a carbon monoxide detector.  The company’s products are beautifully-designed, and the announcement of Google’s acquisition caused excitement in the technology industry.  $3.2 Billion is quite a commitment, even for Google.  The move validates the bullish forecasts for the IoT market, and it positions Google to be a major player in that market.

 

Bill Patch

01/17/14

The "Internet of Things " is Coming

IoT Image

If you haven’t heard much about The Internet of Things (IoT), you soon will.  Also called “The Internet of Everything,”  this refers to the connection of everyday objects to the Internet.  Once objects are wirelessly connected, using sensors installed in them, to the Internet cloud, then data can be transmitted from them and collected and  accessed by various devices, including smartphones, tablets, and personal computers. Appliance manufacturers like LG and computer network companies like Cisco are already installing hardware and software.  There are a bunch of companies, including an especially bright one named ” Evrything,”  that are producing software that collects data from the things and transmits it to the Internet.

Billions of Things, Trillions of Dollars

The technology is already in place to connect all the things in our life, and to start them communicating with us.  All that’s required are:  a) Sensors, which measure things like whether a door is open or closed, or the amount of electricity being consumed by an appliance, or whether a parking space is filled or empty; b)Connectivity, either through a base station or embedded in the device itself; and c) Processors, to parse incoming data from the sensor(s) and transmit it.  IDC, a respected technology market research firm, predicts there will be 30.1 billion installed autonomous things connected by 2020, when  the  IoT industry will generate $ 8.9Trillion revenue in products and services.  ( Source:  Business Insider,  “The 6 Basic Building Blocks for the Things in “The Internet of Things,’  12/31/2013.

Public Trust Is Needed

People close to the industry tend to treat the connection of everything through the Internet as a fait accompli–because it can be done, of course it will be.  They point to the obvious benefits, including public safety and more efficient buildings.  When gas lines can be constantly monitored for leaks, and bridges can be constantly monitored for dangerous wear and tear, and bodies can be monitored for early heart attack signs, and food can be monitored for freshness, and products can be tracked throughout their manufacturing life cycle, lives can be saved and products can be produced more efficiently.  However, in the current environment privacy concerns may slow the growth of the totally connected world.  Today, we see the top executives of some of the leading technology companies writing public letters and making public speeches  to the NSA, decrying the government agency’s misuse of data collected from them. Tim Cook,, Apple’s CEO,recently called them “malicious hackers.”  This self-serving, all-too-public, whining is coming from companies who previously cooperated silently with the collection of all sorts of data about their customers.

 If tech companies cannot protect their customers’ information better than they have thus far, people will not trust the IoT enough to achieve the kind of comprehensive connectivity the tech gurus envision.  Tech companies have to make stronger, safer products–ones that can protect us from malicious  hackers.  If care is taken to build secure systems and gain public trust, the IoT will arrive as a natural evolution.   

Bill Patch

01/01/2014

NAR: Use of Internet for Home Search by Buyers Hits All-Time High at 92%

According to an Inman News article posted on November 4th,2013, “Use of the Internet among consumers in the homebuying process continues to grow, but those buyers are more, not less, likely to use a real estate agent, according to an annual survey from the National Association of Realtors.”  NAR’s study, which  was based on 8767 people who purchased a home between June

 

 

Picture 3 2012 and June 2013 , reported that  92% of the buyers used the Internet to search for homes, up from 90% last year  and 71% in 2003.  The report also indicated that 88% of the buyers used an agent.  Interestingly, 42% said searching online was their first step in the buying process, while 17% said their first step was contacting an agent.  In summary, buyers are using the Internet to search and agents to help with the purchase transaction.  As various local markets lead the recovery in the real estate industry, realtors need to match the consumers’ requirements for technology and services.  Consumers understand that purchasing a home is a complex transaction, one  that requires expertise to protect against the risk of mistakes and to guide the process to a smooth and successful completion.  Most homebuyers are tech-savvy enough to use property search applications  to find potential homes to buy.  Successful  realtors  include both requirements in their marketing strategies, and they provide home search (IDX) programs on their websites, so  prospective homebuyers can search MLS listings and generate buyer transaction leads directly to the realtor. Successful realtors also  provide a full set of services for buyers, both to achieve client satisfaction with the purchase, but also to generate future business (81% of the sellers used a full-services broker, and 63% chose the broker via a referral).   Agents who used to think that representing buyers consisted of finding and showing them listings from the MLS  now understand that they can rely on a good IDX system for some of the finding process, and they focus instead on responding to leads generated by the IDX, showing homes, and  managing the purchase process for the buyer.

Blazing Systems helps hundreds of Delaware Valley realtors with marketing strategies, websites,  and an industry-leading

IDX home search.  Please contact us to arrange a free initial consultation.

     Bill Patch

12/03/13

 

 

 

 

 

 

A Piano Gets a New Life

A baby grand piano is an intricate piece of musical technology—more complex than some of the computer systems we repair, manage , and sometimes renovate.  Recently, we needed work to be done on our family piano, an Estey baby grand built in 1929. It is a classic beauty, but it was beginning to show its age, and it needed lots of work. It needed to be tuned, but before it could be tuned it needed to be  restored and renovated.  Elisabeth, who studied piano at the Boston Conservatory, found the website of a company in West Chester that specializes in the repair and restoration of grand pianos.  We  are always anxious to pass on good news and to recommend great service providers as we find them, so in this post we are highlighting Sweeney Piano, a family company that has been specializing in grand pianos for 30 years.  All of our realtor friends and clients should take note, because many times people who are buying a new home may need to move or repair a grand.  We highly recommend the work of Sweeney Piano.

An Informative and Attractive Website

As promised on their website, they exceeded our expectations for quality and service delivery.  The website is attractive and informative.  Michael and Lisa Sweeney have built a great business, and you get a feel for their high quality standards when you visit the site.  Our piano required a mix of technical work and  artistic refinishing of wood and metal.  To these two prime attributes they added effective communication skills, as they kept us posted about progress—right up to the delivery date, which they hit exactly.  Here’s a picture they sent as the work neared completion:

sweeney piano

If you value your grand piano, and want it treated with care  for any needed repairs or renovation, contact the hard-working folks at Sweeney Piano for service you can count on—for yourself, your friends, or your clients.

As for us, we now have many hours of enjoying Elisabeth’s playing, and we are always happy to find a service company that shares our values..

Bill Patch

10/01/2013

 

 

 

Internet Writing Doesn’t Have to be Bad

The level of public discourse—in emails, Tweets, and Facebook posts and message boards–  is discouragingly low.  It is profane, gramatically incorrect, and not courteous.  It is rough and insulting, and oft-times mean-spirited.

Some people blame technology—It is easy to hide behind the computer screen,with a degree of anonymity, and throw prose stones.  While it’s easy to be anonymous doing a crude posting to a message board, the other forms of computerized communication actually expose the writer. In business emails are written by individuals who used to have secretaries to correct their grammar and language. People tend to treat emails informally, like they were talking to someone, not writing to them.  Gmail even calls them “conversations”….  And, folks get informal, and they start using slang, and they sometimes use sarcasm, or they make a snide remark, trying to be funny…But, it’s not  a conversation, and when it shows  up on the recipient’s screen, it’s just text.  There’s no facial expression to let the recipient know you are fooling, or making a joke.  Sarcasm shows up as a literal statement.  Anybody reading the email sees the person’s writing directly–unfiltered and usually without editing. This generates another problem—people don’t seem to be receiving effective grammar and language  instruction in school.  I don’t know whether teachers simply tired of trying to teach what for most is a boring, tedious subject, or whether school districts just removed grammar and parts of speech from curricula, but  many emails and other documents in business are starting to show that the writers did not get a good background in grammar and language, and many are spelling and using words phonetically.  This gets people in trouble with possessive pronouns and contractions of pronouns that sound the same.  Thus, they confuse and misuse:  Its and It’s, There,  Their, and They’re;  and Your and You’re.

 

So….emails show up on screens and make a bad impression, or sometimes no impression, or sometimes they hurt peoples’ feelings .

 

Emails are not verbal,they are a document, and they can be more effective if they are well-written. The overall Internet writing problem hit a new low  this past week, as people took to Twitter and message boards to denounce the Miss America winner. Because the young woman was Indian, she was called a terrorist, an Arab, and worse.  The nasty tone  and ignorance of the messages  that appeared were embarrassing.

 

Once you hit the send button, your words may appear in a virtually infinite number of locations. Internet writing is important.  People need to be more careful , and even more cordial and courteous, in the writing they do in the many  electronic venues now available. Workshops should be held to give folks some skills in writing emails and Facebook and other postings–for business or personal use. Good grammar and language create writing that respects the recipient. Angry, selfish communications degrade both the writer and the reader.

Bill Patch

09/26/2013

 

 

 

 

 

 

Wearable Technology is Here

Forty-one years ago, when I started in the computer industry, computers were serious machines.  They were big, filling a whole room.  They whirred, blew fuses, spit out long complex reports, sucked up lots of air conditioning, and had nice red and green blinking lights.  The reports they produced were used to run large organizations, including businesses and serious government agencies.  Only highly-qualified people could actually approach the machines and do something with them.  But we’ve evolved now, and computers are everywhere, being used  to play Candy Crush, look at pictures on Facebook, and send 140-characters-or-less messages to the world.    We have devices that we use to get news, play games, and talk to each other.  All these devices use the same basic zeroes- and-ones computing technology that powered the first behemoths.  The Technology  Industry  is now betting that we need our devices with us so much, we’ll actually be willing to wear them .  Last week Samsung   announced its new Smartwatch, The Gear.samsung smart watch

 

 

applesmartwatch

Business Insider,  a technology industry information provider, forecasts that worldwide spending on smartwatches will rise steadily to $ 9Billion in sales by 2018.  If I were Samsung, however, I wouldn’t count on those billions just yet.  Even though we have shown a seemingly endless demand for the conspicuous consumption of computerized devices—Have you ever seen two people sitting together in a room, texting, rather than talking?—I think $300 a pop is a bit much in today’s economic environment, and wearing our technology just might be an over-step.

 

maxwell smart

 

 

 

 

 –Bill Patch 9/12/2013