Friday, May 13, 2011

Chromebook


During their developers conference this past week, Google has introduced a new operating system called Chrome OS installed in ultra-portable laptops called Chromebooks. This operating system only uses the web and is constantly connected to the web. From movies and music to email and word processing, everything is done through the Chrome browser. The concept is great, as you can access all your information from the cloud. You wouldn't have to worry about forgetting your flash drive or forgetting to save your file. And security is great because anyone who steals your computer can't access your files as it is stored somewhere in Google's servers. However, with service providers limiting the amount of data bandwidth for each customer as I have mentioned in my previous post, it is not completely worry free. Customers would have to monitor their data usage. Also cloud computing is not always reliable and secure, as companies's servers sporadically shut down due to maintenance or are hacked by intruders. If you saved your homework in Google's servers and realized you couldn't access it the day it is due because of a bug in the server, then having cloud features would be useless. Cloud computing is becoming more and more popular. However, we should remember to always back up our files to physical locations where we have access to. It will be interesting how customers would use and adapt this new concept of Chrome OS as convenience does come at a price.

Video intro of Chromebook:

Tuesday, May 10, 2011

Cloud Versus Cap


As people are becoming more and more mobile, the direction of computing is going to the cloud.  Cloud computing is when resources and applications are stored at a remote location and could be accessed just about anywhere.  An example would be web email services such as Gmail and Yahoo mail.  Anyone with an account can access their email from any computer that has a web browser.  There is no need to use an installed email client on the computer.  Cloud computing allows people to access their information and applications without having to actually carry around their data and computers.  Many companies are starting to use the cloud and offer cloud services.  Companies like Amazon are now offering cloud drives where customers can store data onto their servers and access it from any web browser.  Netflix allows customers to stream movies from the company's cloud instead of having to download first in order to view them.


Although cloud computing is more convenient, it demands more bandwidth because data is streamed more often through networks.  Many wireless providers such as Verizon and AT&T implement data caps to their data plans due to the high usage of bandwidth.  Customers have a set limit in the amount of data they can upload or download and if they go over the limit, they would have to pay additional fees for more data usage.  Just recently, AT&T imposed a data cap on all of its DSL home Internet users.  They claim that it is to restrict the top five percent of users who use a disproportionate amount of bandwidth and would actually help customers.  However, customers are skeptical about the cap and are unhappy about it.  The direction Internet service providers are going is completely opposite of the direction cloud computing is going.  The data caps they impose hinder the progress of cloud computing.  Internet service providers should instead improve their services for their customers.  Cloud computing requires more bandwidth and the providers must widen the bandwidth, not restrict it by charging customers more.  Time and time again, we see these companies continually take customers' money without much improvement on services and in some cases, even a decrease in services.

Saturday, May 7, 2011

Businesses Going Postal


With the rising popularity of the Internet, many people have shifted from traditional mail to electronic communications such as email and instant messaging.  The United States Postal Service has experienced a drop in mail volume over the past 5 years and as a result, lost billions of dollars in revenue.  Due to its deficit, USPS has been borrowing money from the U.S. Treasury.  Some speculate that USPS's current situation is dire, and that the company should cut more jobs and services, such as Saturday deliveries, to save money.  Others, however, see USPS as an opportunity for other businesses.  Michael Ravnitzky, a chief counsel of the Postal Regulatory Commission, suggests that the hundreds of thousands of delivery vehicles that USPS deploys daily could be used for more than just delivering mail.  He believes USPS can use its vehicle network to provide telematic services.  Because USPS delivery trucks go through millions of delivery points almost daily, sensors can be added to the vehicles to detect a variety of things throughout the United States, monitoring things like air quality, road conditions, and traffic.  Businesses could then pay USPS to use their sensors.  For example, a wireless phone company can use the USPS sensors to detect any dead zones in the country and improve their wireless service without having to spend more money using their own vehicles and methods.  Government agencies can also use USPS sensors and network to improve security, having the sensors detect any chemical or biological agents in the air.


The cost of adding sensors to the vehicles is relatively low and revenues from it can help sustain the postal service.  Creativity has to be used with technology.  Some people would blame technology, saying that it hurts the USPS business without finding any solution to the problem.  However, people like Ravnitzky can see the benefits of technology and creatively use it to save USPS.  With snail mail becoming obsolete, this might become a new business model for USPS.

Monday, May 2, 2011

Network Intrusion


When data is placed onto the Internet, it is not always secure.  Sony's network is a good example of that.  Two weeks ago, Sony's Playstation Network (PSN) and Qriocity services were infiltrated by hackers looking to steal information about Sony's customers.  Sony was alerted about the intrusion, through their security system, and shut down their networks.  However, they were too late.  Hackers were able to steal information ranging from customers' addresses, email addresses, and credit card information.  Millions of PSN users' data were compromised.  Sony held a press conference earlier this week regarding this intrusion.  They stated that although data was stolen, credit card information was encrypted, so hackers would not be able to decode that data into anything useful.  Customers' addresses and other data however, were not.  This attack on Sony's networks is not only bad for customers but for Sony as well.  Their reputation of being a reliable brand is lowered due to the attack and people question their integrity of security measures.  Lawsuits may also occur because Sony did not handle the data securely and the FBI is currently investigating the whole situation.

Comic from Penny Arcade

We should, however, be reminded that this can happen to any site or service on the Internet.  A few months ago, news and media site, Gawker and its sister sites were compromised.  Only usernames and passwords were stolen.  However, if these usernames and passwords were also used in bank accounts and other more important sites, hackers can steal more than just information.  To safeguard ourselves, passwords should be differentiated according to four tiers:

Tier 1: Online Banking
This tier should have a really complex password as this account is linked to actual money.  A mix of numbers, upper and lowercase letters would be best.

Tier 2: Primary Email Accounts, E-Commerce Accounts (i.e. Amazon, Ebay)
This tier should have complex passwords as well because lost passwords would be linked back to your primary email accounts and websites were you shop have your credit card information.

Tier 3: Social Networking Sites, Blog sites
This tier would need less complex passwords.  However, it is still good to have a strong password as these sites reflect your reputation online as well as in real life.  Safeguarding these with a good password is not a bad idea.

Tier 4: Fun sites, News Sites (i.e. Hulu, Engadget)
In this tier, passwords can be the same throughout the tier as it would be easier to remember.  If a hacker does get your password, all he or she has access to are sites that are for consuming media only.  It would not be of any use to them.

As Internet users, we should be reminded that data can be compromised and keep passwords strong.  Although it may seem like a hassle, having multiple passwords, it would save a lot of hassle in the long run especially if you get hacked.