adeelarshad82 writes "For the fourth year running, PCMag sent drivers out on U.S. roads to test the nation's Fastest Mobile Networks. Using eight identical Samsung phones, the drivers tested out eight separate networks for four major carriers across 30 cities evenly spread across six regions. Using Sensorly's 2013 software, a broad suite of tests were conducted every three minutes: a 'ping' to test network latency, multi-threaded HTTP upload and download tests including separate 'time to first byte' measures, a 4MB single-threaded file download, a 2MB single-threaded file upload, the download of a 1MB Web page with 70 elements, and 100kbps and 500kbps UDP streams designed to simulate streaming media. Nearly 90,000 data cycles later, the data not only revealed the fastest networks (AT&T) and the most consistent (Verizon), but also other interesting points. The tests recorded the fastest download speed (66.11 Mbits/sec) in New Orleans and the best average in Austin (27.25 Mbits/sec), both for AT&T's LTE network. The tests also found T-Mobile's HSPA network to have the worst Average-Time-To-First-Byte, even when compared with AT&T HSPA network. Also according to the tests, Sprint's LTE network didn't even come close to competing with other LTE networks, to the point that in some cities its LTE network speed averaged less than T-Mobile's HSPA network speed."
Make a difference in your data center. Sign up for SlashDataCenter Update newsletter now.
Atticus Rex writes "The fact that our social networking services are so centralized is a big part of why they fall so easily to government surveillance. It only takes a handful of amoral Zuckerbergs to hand over hundreds of millions of people's data to PRISM. That's why this Slate article makes the case for a mass migration to decentralized, free software social networks, which are much more robust to spying and interference. On top of that, these systems respect your freedom as a software user (or developer), and they're less likely to pepper you with obnoxious advertisements." On a related note, identi.ca is ditching their Twitter clone platform for pump.io which promises an experience closer to the Facebook news feed. Unfortunately, adoption seems slow since Facebook, Google, et al have an interest in preventing interoperability and it can be lonely on the distributed social network.
Bob the Super Hamste writes "The St. Paul Pioneer press is reporting that Comcast is planning on expanding its network of public WiFi hot spots in the Twin Cities area by using home internet connections and user's WiFi routers. Customers will be upgraded to new wireless routers that will have 2 wireless networks, one for the home users and one for the general public. Subscribers to Comcast's Xfinity service and customers that participate in the public WiFi program will be allowed free access to the public WiFi offered by this service. Non Comcast customers get 2 free sessions a month each lasting 1 hour with additional sessions costing money. The article mentions that a similar service already exists and is provided by the Spain-based company Fon."
An anonymous reader writes "Computerworld has an interview with an Australian startup called LIFX, producing WiFi-connected LED light bulbs. Each light bulb is a small computer running the Thingsquare distribution of the open source Contiki operating system that creates a low-power wireless mesh network between the light bulbs and connects them to the WiFi network. The wireless mesh network lets the light bulbs be controlled with a smartphone app. Through a Kickstarter project, the company has already raised a significant amount of money: over one million USD. "
New submitter jcenters writes "Apple's new AirPort routers feature the new 802.11ac protocol, promising Wi-Fi speeds in excess of 1 Gbps, but Glenn Fleishman of TidBITS explains why we are unlikely to see such speeds any time soon. Quoting: 'When Apple says that its implementation of 802.11ac can achieve up to 1.3 Gbps — and other manufacturers with beefier radio systems already say up to 1.7 Gbps — the reality is that a lot of conditions have to be met to achieve that raw data rate. And, as you well know from decades of network-technology advertising, dear reader, a “raw” data rate (often incorrectly called “theoretical”) is the maximum number of bits that can pass over a network. That includes all the network overhead as well as actual data carried in packets and frames. The net throughput is often 30 to 60 percent lower.'"
First time accepted submitter jarle.aase writes "It's doable today to use a mix of virtual machines, VPN, TOR, encryption (and staying away from certain places; like Google Plus, Facebook, and friends), in order to retain a reasonable degree of privacy. In recent days, even major mainstream on-line magazines have published such information. (Aftenposten, one of the largest newspapers in Norway, had an article yesterday about VPN, Tor and Freenet!) But what about the cell-phone? Technically it's not hard to design a phone that can switch off the GSM transmitter, and use VoIP for calls. VoIP could then go from the device through Wi-Fi and VPN. Some calls may be routed trough PSTN gateways — allowing the agencies to track the other party. But they will not track your location. And they will not track pure, encrypted VoIP calls that traverse trough VPN and use anonymous SIP or XMPP accounts. Android may not be the best software for such a device, as it very eagerly phones home. The same is true for iOS and Windows 8. Actually, I would prefer a non cloud-based mobile OS from a vendor that is not in the PRISM gallery. Does such a device exist yet? Something that runs a relatively safe OS, where GSM can be switched totally off? Something that will only make an outgoing network connection when I ask it to do so?" And in the absence of a perfect solution, what do you do instead? (It's still Android and using the cell network, but Red Phone — open sourced last year — seems like a good start.)
judgecorp writes "The Demo VC funding event has hit Europe (Moscow, specifically), and it is very clear that start-ups in Europe have to compete hard for any venture capital. In its 20 year history in Silicon Valley, Demo is famous for highlighting subsequent success stories such as Netscape, Skype and Salesforce.com. Demo Europe began with a venture capitalist waxing lyrical on how the shortage of funds means he gets plenty of choice where to put his money. Promising tech start-ups have a series of hoops to jump through including brief pitches. The most promising candidates so far include a Russian social VoIP network and a shared whiteboard."
Zothecula writes "Ever since it was first unveiled in 2007, many people were captivated with the sleek, futuristic looks of the Aptera. When Aptera Motors went out of business in 2011, not having commercially produced a single vehicle, those same people were understandably disappointed. Now, word comes that a new company may be manufacturing and selling Apteras as soon as next year." Says the article: "Aptera USA has most of the original company’s prototypes, equipment, patents and designs, so it wouldn’t be starting from scratch. Given that fact, Deringer hopes that Aptera USA could be making cars as early as the first quarter of 2014. He’s currently in the process of hiring engineers, and the company has already put in an order for 1,000 bodies from its Detroit-based supplier." Until there really is a super-charger network from central Texas to California, I wish I could get one of the gas-powered (or gas-electric hybrid) Apteras. Why should Tesla have all the fun?
cervesaebraciator writes "In the wake of recent revelations from Edward Snowden, apologists for the state security apparatus are predictably hitting the airwaves. Some are even 'glad' the NSA has been doing this. A major point they emphasize is that the content of calls have remained private and it is only the metadata that they're interested in. But given how much one can tell from interpersonal connections, does the surveillance only represent a 'modest encroachments on privacy?' It is easy enough to imagine how metadata on phone calls made to and from a medical specialist could be more revealing than we'd like. But social network analysis can reveal far more. Duke sociologist Kieran Healy, in a light-hearted but telling article, shows how one father of the American Revolution could have been identified using the simplest tools of social network analysis and only a limited dataset."
An anonymous reader writes "The Register carries the funniest, most topical IT story of the year: 'Facebook's first data center ran into problems of a distinctly ironic nature when a literal cloud formed in the IT room and started to rain on servers. Though Facebook has previously hinted at this via references to a 'humidity event' within its first data center in Prineville, Oregon, the social network's infrastructure king Jay Parikh told The Reg on Thursday that, for a few minutes in Summer, 2011, Facebook's data center contained two clouds: one powered the social network, the other poured water on it.'"
An anonymous reader writes with this excerpt from Prachatai.com: "Thailand's Rangers Task Force 45, in response to Army policy, has put its troops to the task of promoting and protecting the monarchy in cyber space, claiming to have posted 1.69 million comments on webboards and social media during a 4-month period of last year ... According to the video clip, the Army Chief has approved the establishment of an army internet network to promote and protect the monarchy by monitoring websites and webboards which have content alluding to the monarchy and countering them by posting comments which worship the institution. ...The unit's military operations personnel provide the troops with information, or what to post, and set them targets for the number of posts they must complete."
An anonymous reader writes "We operate a wide area network that has a large amount of fiber optics, and provides service to our various departments in locations across the state. The network is reasonably complex, with splices, patches, and the general type of ad-hoc build that makes knowing where things go difficult. I'd like to implement some type of software to record where the fiber cables run, what pit number they are jointed in, which fiber is spliced to which, and what internal customer is using which fiber path through the system. Knowing what fibers are free for use is also a requirement, and I'd love to record details of what equipment was put in where, for asset and warranty tracking. Extra points if I can give Engineering access to help them design things better!"
An anonymous reader writes "Privacy and surveillance have taken centre stage this week with the revelations that U.S. agencies have been engaged in massive, secret surveillance programs that include years of capturing the meta-data from every cellphone call on the Verizon network (the meta-data includes the number called and the length of the call) as well as gathering information from the largest Internet companies in the world including Google, Facebook, Microsoft, and Apple in a program called PRISM. Michael Geist explains how many of the same powers exist under Canadian law and that it is very likely that Canadians have been caught up by these surveillance activities."
An anonymous reader writes "Is there a device to automatically disconnect network or otherwise time limit a physical connection to a network? The why? We are dealing with a production outage of large industrial equipment. The cause? The supplier, with no notice, remotely connected to the process control system and completely botched an update to their system. We are down and the vendor is inept and not likely to have us back to 100% for a few days. Obviously the main issue is that they were able to do this at all, but reality is that IT gets overridden by the Process Control department in a manufacturing business. They were warned about this and told it was a horrible idea to allow remote access all the time. They were warned many times to leave the equipment disconnected from remote access except when they were actively working with the supplier. Either they forgot to disconnect it or they ignored our warnings. The question is, is there a device that will physically disconnect a network connection after a set time? Yes, we could use a Christmas tree light timer hooked up to a switch or something like that but I want something more elegant. Something with two network jacks on it that disconnects the port after a set time, or even something IT would have to login to and enable the connection and set a disconnect timer would be better than nothing. As we know, process control workers and vendors are woefully inept/uneducated about IT systems and risks and repeatedly make blunders like connecting process control systems directly to the internet, use stock passwords for everything, don't install antivirus on windows based control computers, etc. How do others deal with controlling remote access to industrial systems?"
benrothke writes "Phil Lapsley calls his book 'the untold story of the teenagers and outlaws who hacked Ma Bell.' The story is an old one, going back to the early 1960's. Lapsley was able to track down many of the original phone phreaks and get their story. Many of them, even though the years have passed, asked Lapsley not to use their real names." Read below for the rest of Ben's review.
JonZittrain writes "Projects like the New American Foundation's Commotion are designing ad hoc mesh networking to keep communications open when governments want to censor. Former FCC Chairman Julius Genachowski and I argue that mutual-aid-based networks can be helpful for public safety, too, after attacks or natural disasters. There should be easy practices for anyone to open up an otherwise-closed Wi-Fi access point if it's still connected to broadband and is near people in trouble, and separately, to develop delay- and fault-tolerant fallback ad hoc networks so users' devices can communicate directly with one another and in a mesh. This can happen even while full packet-based ad hoc mesh is being figured out. The ideas have been developed a little in workshops at Harvard's Berkman Center and the FCC. Why not bring the human rights and public safety communities together towards a common goal?"
First time accepted submitter william.meaney1 writes "I'm the sole network admin at a 25 person company. I was lucky enough to get the opportunity less than a year after getting a technical degree in IT. I've had some huge opportunities here (for a first time network admin). After my schooling, I went ahead and I'm now CompTIA A+, Network+, and CCNA certified. Now, being hired out of school, I was grateful for the job, and the boss hired me for peanuts (Less than $30,000/year) I've been living at home, using that money for loan payments, car payments, and certification expenses. I've started looking for other work, and I feel more than qualified for most of the requirements I'm seeing. The big hurdle I'm coming across that EVERYONE seems to want is experience with SQL databases, and Microsoft Exchange. I was wondering if anyone had any ideas for getting usable experience on a low budget. I have some SQL experience, I deployed a source control program here that uses a SQL express backend, but what else do you need to know for database maintenance?"
Trailrunner7 writes "For many observers of the privacy and surveillance landscape, the revelation by The Guardian that the FBI received a warrant from the secretive Foreign Intelligence Surveillance Court to require Verizon to turn over to the National Security Agency piles of call metadata on all calls on its network probably felt like someone telling them that water is wet. There have been any number of signals in the last few years that this kind of surveillance and data collection was going on, little indications that the United States government was not just spying on its own citizens, but doing so on a scale that would dwarf anything that all but the most paranoid would imagine." And now the Obama administration has defended the practice as a "critical tool."
Nerval's Lobster writes "Monsanto is more infamous for growing its genetically modified crops than its use of software, but a series of corporate acquisitions and a new emphasis on tech solutions has transformed it into a firm that acts more like an innovative IT vendor than an agribusiness giant. Jim McCarter (the Entrepreneur in Residence for Monsanto) recently detailed for an audience in St. Louis how the company's IT efforts are expanding. Monsanto's core projects generate huge amounts of bits, especially its genomic efforts, which are the focus of so much public attention. Other big data gobblers are the phenotypes of millions of DNA structures that describe the various biological properties of each plant, and the photographic imagery of crop fields. (All told, there are several tens of petabytes that need storage and analysis, a number that's doubling roughly every 16 months.) With all that tech muscle, the company has launched IT-based initiatives such as its FieldScripts software, which uses proprietary algorithms (fed with data from the FieldScripts Testing Network and Monsanto research) to recommend where to best plant corn hybrids. 'Just like Amazon has its recommendation engine for what book to buy, we will have our recommendations of what and how a grower should plant a particular crop,' said McCarter. 'All fields aren't uniform and shouldn't be planted uniformly either.' Despite its increasingly sophisticated use of data analytics in the name of greater crop yields, however, Monsanto faces pushback from various groups with an aversion to genetically modified food; a current ballot initiative in Washington State, for example, could result in genetically modified foods needing a label in order to go on sale here. The company has also inspired a 'March Against Monsanto,' which has been much in the news lately."
mask.of.sanity writes "Vulnerabilities in Hybrid Broadcast Broadband TV television sets have been found that allow viewers' home networks to be hacked, the programs they watched spied on, and even for TV sets to be turned into Bitcoin miners. The laboratory attacks took take advantage of the rich web features enabled in smart TVs running on the HbbTV network, a system loaded with online streaming content and apps which is used by more than 20 million viewers in Europe."