Tagged: Internet Toggle Comment Threads | Keyboard Shortcuts

  • jkabtech 12:53 pm on October 24, 2019 Permalink |
    Tags: , Internet, , Spirit, Strait, Tasmania   

    Spirit of Tasmania brings satellite internet to Bass Strait 

    For crew and passengers.

    The iconic ferry service connecting Melbourne and Devonport will, finally, now have onboard wi-fi after partnering with satellite internet provider IPSTAR Broadband.

    Spirit of Tasmania travellers will now be able to access the internet for $20 per crossing or $12 an hour, which could quickly eclipse the cheapest ticket price ($79) on the nine to eleven-hour crossing.

    The service runs on a 1.5 metre gyrostabilised antenna with a 16W Ku band (12 to 18 gigahertz) transmitter connecting to IPSTAR Broadband’s Thaicom 4 satellite.

    While the speed of the service hasn’t been advertised, Spirit of Tasmania advises travellers to “bear in mind that the internet is delivered to the ship via satellite,” and “may be a little slower than what you’re used to on land”.

    It also warns that certain types of content or bandwidth-intensive use may be blocked or limited, including connections over virtual private networks, online gaming, torrenting, and sending or receiving large files.

    However, the ship also operates a free media streaming service over wi-fi that plays free-to-air TV along with “inspiring videos” of the island state and footage of “behind-the-scenes action” from the ship.

    Strategically, passengers are also reminded that they can connect to email and social media to let the world know what a great time they’re having on board (or be pestered by LinkedIn connections).

    Connecting to the ship’s Cisco wireless network will also give staff full access to the travel operator’s booking platform, allowing them to check details and make amendments in real-time to reduce duplication and increase responsiveness to passenger requests.

    And unlike some employers, the ship operator is also flagging the connectivity as a way to connect with their landlocked friends and family while onboard.

    Chief information officer at Spirit of Tasmania, Simon Pearce, said that the stabilised antenna should provide speedy and consistent internet access on the windswept strait.

    “We’re continually looking for ways to improve the on board experience for our passengers and by introducing the NAVA system they can now enjoy a fast seamless service throughout their entire journey,” Pearce said.

    “From an operational perspective, by ensuring a constant connection between our crew on board and our staff on shore, we are in the best possible position to continue providing exceptional service to our passenger and freight clients.”

    Got a news tip for our journalists? Share it with us anonymously here.

    View the Original article

     
  • jkabtech 4:53 am on October 19, 2019 Permalink |
    Tags: 2023:, , Internet, , , , , usage   

    China’s internet data power usage to surge through 2023: study 

    Putting further pressure plans to curb smog and carbon emissions.

    China’s burgeoning internet data sector will increase its power consumption by two-thirds by 2023, putting further pressure on the country’s plans to curb smog and carbon emissions, according to a study published on Monday.

    China, the world’s biggest energy consumer and producer of climate-warming greenhouse gas, is in the middle of a programme aimed at upgrading its economy, easing its dependence on old polluting sectors like steel, and cleaning up its mostly coal-fired energy system.

    Big data is set to play an increasing role in supplying cleaner electricity, especially in the creation of decentralised “smart grid” systems, but it is also becoming one of the biggest consumers of power in China and elsewhere.

    According to the study by environmental group Greenpeace and the North China Electric Power University, soaring power consumption from internet data centres is expected to result in higher carbon dioxide (CO2) emissions from the country’s coal-fired power plants.

    The sector was responsible for around 99 million tonnes of CO2 last year, and extra efforts need to be made to encourage firms to source power from renewable sources to prevent that figure from spiralling higher, the study said.

    “Power market reforms and rapid growth in wind and solar power have created unprecedented opportunities for China’s internet giants to procure clean energy,” said Greenpeace East Asia climate and energy campaigner Ye Ruiqi.

    Power consumption from data centres reached 161 terawatt-hours (TWh) last year, 2.35 percent of China’s total, and it is set to rise to 267 TWh in the next five years, more than Australia’s total consumption from all sources in 2018, the study forecast.

    The study said China was home to 2.7 million server racks, with the sector expanding at a rate of around 30 percent a year. The sector’s CO2 emissions could reach 163 million tonnes by the end of 2023, but that could be cut by 16 million tonnes if its renewable intake is increased from 23 percent to 30 percent.

    “Twenty years from now, it is possible that data centres and big data will account for a third of power consumption, three times as much as electric vehicles,” said Emmanuel Lagarrigue, Chief Innovation Officer of Schneider Electric, which works with big internet and technology companies in the United States and China.

    “It is going to consume a lot of electricity but that doesn’t mean it will be less sustainable – many of the players are thinking about how to innovate,” he said.

    Got a news tip for our journalists? Share it with us anonymously here.

    View the Original article

     
  • jkabtech 8:17 pm on December 14, 2017 Permalink |
    Tags: , confuses, Internet, ,   

    Wi-fi flaw confuses Aussie internet users 

    D-Link reiterates KRACK researchers’ assertion that APs aren’t targeted. Do home routers really need urgent patching?

    Confusion is sweeping Australian internet users after the disclosure of a flaw in the WPA2 protocol used to secure wi-fi, with many unsure of what they need to patch.

    The flaw, which was made public late on Monday night local time, puts almost all personal and enterprise wireless-enabled devices and networks at risk of attack.

    The researchers who uncovered the so-called KRACK attack assert that it “does not exploit access points, but instead targets clients” – and that “for ordinary home users, your priority should be updating clients such as laptops and smartphones”.

    Despite this, there remains considerable confusion on whether home routers need to be updated or not.

    A D-Link A/NZ representative told Whirlpool that the vulnerability “is targeting … clients and not the routers/access points” (APs).

    “If the router/AP is running in normal wi-fi mode (as an access point) – it is not vulnerable (but the client still is, unless it is patched),” the representative said.

    “A router/AP will only be affected if running in ‘AP client mode’ – this mode is not enabled in our routers and very rarely used in APs.”

    The D-Link representative indicated the router maker would patch its firmware using code from the manufacturers of wi-fi chipsets incorporated into its products.

    “But again – the important part is to patch the clients (computers, phones, tablets),” the representative said.

    “Modifying the wi-fi code on

    View the Original article

     
  • jkabtech 8:17 pm on December 2, 2017 Permalink |
    Tags: , entries, , Internet,   

    Internet Explorer leaks user address bar entries 

    Apple iOS 11 kills wi-fi backdoor exploit Vodafone to upgrade cell sites with massive MIMO LOG IN SUBSCRIBE  

    View the Original article

     
    • Alex 12:53 pm on January 21, 2018 Permalink | Log in to Reply

      It’s really a nice and helpful piece of info. I am happy that you simply shared this helpful info with us. Please keep us informed like this. Thanks for sharing.

      Like

  • jkabtech 4:17 am on November 23, 2017 Permalink |
    Tags: , Internet, , ridiculed   

    How Australia's $49B internet network came to be ridiculed 

    3e528dc1-d235-45b8-9c89-61b6b005092d%2161e63af6-03e6-4329-aede-21ec4992a675%2165fb7fb8-541b-4a9f-97d3-ffce7a6f62f1%2172d243a7-687b-4e7d-a022-1e36a138b0be%21d716fd26-4bcc-411e-93ab-3272db12ea6b&for_nation

    View the Original article

     
  • jkabtech 6:59 am on February 24, 2016 Permalink |
    Tags: Blockchain, Internet, , ushers, Value   

    Blockchain technology ushers in the “Internet of Value” 

    It was the buzz at the recent World Economic Forum in Davos. Wall Street banks are pouring money into it. And Mark Andreesen has called it the most important technology since the Internet itself.

    What is it? The blockchain, of course.

    Created by the mysterious hacker known as Satoshi Nakamoto, the blockchain—the distributed ledger technology that underlies the Bitcoin virtual currency—Blockchain has the potential to upend industries from finance to real estate to entertainment. has the potential to upend industries from finance to real estate to entertainment. That has Silicon Valley titans, global finance leaders and even indie artists scrambling to grasp the implications of the technology—and make sure they aren’t broadsided by it.

    Tim Swanson, head of research at R3, a New York technology startup backed by a consortium of big banks, has described the blockchain as being “a bit like gluten—everybody is talking about it but no one knows what it is in great detail.”

    In the simplest terms, the blockchain transfers value from one party to another over the Internet. That could be money, a share of stock, a property deed, a digital royalty—even a vote cast in an election.

    Today, such transactions often pass through multiple intermediaries to be validated, cleared and processed, and are stored in central ledgers maintained by an authority, such as a central bank in the case of financial transactions or the Mortgage Electronic Registration System (MERS) for mortgages.

    The blockchain distributes the validation and storage of transactions over many computers in a secure and public way, eliminating the need for a middleman. In doing so, it drastically reduces the time and cost to process a transaction to close to zero.

    Alex Tapscott, CEO of Northwest Passage Ventures, an advisory firm in the blockchain space and author of an upcoming book on the subject, says blockchain technology represents the next generation of the Internet, what he calls the Internet of Value.Blockchain technology represents the next generation of the Internet- the Internet of Value.

    While the technology—both the original Bitcoin blockchain and new variations of it—has sweeping potential to transform vast sectors of the economy, says Tapscott, the first blockchain applications are taking root in two areas: financial services and creative industries such as music and media.

    As a ledger system, the blockchain’s most obvious application is in finance, and banks have awoken to the threat and opportunity it poses. R3CEV, a blockchain technology company owned by a consortium of banks, has grown from nine members at its founding in September 2015 to more than 40 today. By one estimate, Wall Street spending on blockchain could reach $400 million in the next few years. By one estimate, Wall Street spending on blockchain could reach $400 million in the next few years.

    Consider stock trading. In a market where competitive advantage is measured in nanoseconds, trades can still take up to three days to settle, notes Tapscott. Blockchain-based systems could cut that to seconds or minutes. That’s especially attractive for complex trades such as derivatives, where market conditions can change before a trade is settled, creating substantial counterparty risk.

    The Commodity Futures Trading Commission is studying the potential application of distributed ledger technology to the derivatives market. And Nasdaq recently conducted its first trade using the blockchain. “Through this initial application of blockchain technology, we begin a process that could revolutionize the core of capital markets infrastructure systems,” said Nasdaq CEO Bob Greifeld in announcing the milestone. “The implications for settlement and outdated administrative functions are profound.”

    Another financial market ripe for disruption is foreign exchange and cross border remittance. Nearly $500 billion a year is transferred between countries, often by people working abroad that send money home to relatives. That process is slow and cumbersome, with high fees that take a painful bite out of hard-earned savings. A startup called Abra has created a mobile app that uses the blockchain to streamline the remittance process, allowing individuals to transfer money from one continent and currency to another instantaneously and without hefty fees.

    By collapsing the time and cost of a transaction, distributed ledger technology paves the way for true micropayments in increments as small as a penny. Such micropayments are seen as the Holy Grail for creative industries such as music and media that have been pummeled by the harsh economics of the Internet and an outmoded royalty payment system.

    Blockchain-enabled technology could allow new artist-friendly business models to flourish. For example, musicians might be paid, say, a nickel every time someone listens to a song. Journalists, likewise, might be paid a few cents every time someone reads an article. Artists, most notably Grammy award winner Imogen Heap, are exploring the use of blockchain for music distribution and compensation.

    Many creative assets, from films to songs, are produced by a team, and the blockchain could make tracking and paying royalties to these contributors more efficient and transparent.

    Blockchain technology is still new, and like gluten, it has received a fair amount of hype. There are issues to be worked out—such as whether blockchain ledgers will scale without being overwhelmed. But these are “implementation challenges” that can be solved, says Tapscott.  Blockchain, he says, “is a big breakthrough that could ultimately change the nature of business and the corporation itself.”

    ###

    The contents or opinions in this feature are independent and may not necessarily represent the views of Cisco. They are offered in an effort to encourage continuing conversations on a broad range of innovative technology subjects. We welcome your comments and engagement.

    We welcome the re-use, republication, and distribution of “The Network” content. Please credit us with the following information: Used with the permission of http://thenetwork.cisco.com/.

    author-img

    About Amy Cortese @locavesting

    Amy Cortese is an award-winning journalist and the author of Locavesting (Wiley, 2011)

    View the original article here

     
  • jkabtech 5:32 am on January 16, 2016 Permalink |
    Tags: Consumers, , Internet,   

    How Will Consumers Use Faster Internet Speeds? 

    View the original article here

     
  • jkabtech 8:57 pm on January 13, 2016 Permalink |
    Tags: Doctorow, Internet, , ,   

    Cory Doctorow on Software Security and the Internet of Things 

    The Trolley Problem is an ethical brainteaser that’s been entertaining philosophers since it was posed by Philippa Foot in 1967:

    A runaway train will slaughter five innocents tied to its track unless you pull a lever to switch it to a siding on which one man, also innocent and unawares, is standing. Pull the lever, you save the five, but kill the one: what is the ethical course of action?

    The problem has run many variants over time, including ones in which you have to choose between a trolley killing five innocents or personally shoving a man who is fat enough to stop the train (but not to survive the impact) into its path; a variant in which the fat man is the villain who tied the innocents to the track in the first place, and so on.

    Now it’s found a fresh life in the debate over autonomous vehicles. The new variant goes like this: your self-driving car realizes that it can either divert itself in a way that will kill you and save, say, a busload of children; or it can plow on and save you, but the kids all die. What should it be programmed to do?

    I can’t count the number of times I’ve heard this question posed as chin-stroking, far-seeing futurism, and it never fails to infuriate me. Bad enough that this formulation is a shallow problem masquerading as deep, but worse still is the way in which this formulation masks a deeper, more significant one.

    Here’s a different way of thinking about this problem: if you wanted to design a car that intentionally murdered its driver under certain circumstances, how would you make sure that the driver never altered its programming so that they could be assured that their property would never intentionally murder them?

    There’s an obvious answer, which is the iPhone model. Design the car so that it only accepts software that’s been signed by the Ministry of Transport (or the manufacturer), and make it a felony to teach people how to override the lock. This is the current statutory landscape for iPhones, games consoles and many other devices that are larded with digital locks, often known by the trade-name “DRM”. Laws like the US Digital Millennium Copyright Act (1998) and directives like the EUCD (2001) prohibit removing digital locks that restrict access to
    copyrighted works, and also punish people who disclose any information that might help in removing the locks, such as vulnerabilities in the device.

    There’s a strong argument for this. The programming in autonomous vehicles will be in charge of a high-speed, moving object that inhabits public roads, amid soft and fragile humans. Tinker with your car’s brains? Why not perform amateur brain surgery on yourself first?

    But this obvious answer has an obvious problem: it doesn’t work. Every locked device can be easily jailbroken, for good, well-understood technical reasons. The primary effect of digital locks rules isn’t to keep people from reconfiguring their devices – it’s just to ensure that they have to do so without the help of a business or a product. Recall the years before the UK telecoms regulator Ofcom clarified the legality of unlocking mobile phones in 2002; it wasn’t hard to unlock your phone. You could download software from the net to do it, or ask someone who operated an illegal jailbreaking business. But now that it’s clearly legal, you can have your phone unlocked at the newsagent’s or even the dry-cleaner’s.

    If self-driving cars can only be safe if we are sure no one can reconfigure them without manufacturer approval, then they will never be safe.

    But even if we could lock cars’ configurations, we shouldn’t. A digital lock creates a zone in a computer’s programmer that even its owner can’t enter. For it to work, the lock’s associated files must be invisible to the owner. When they ask the operating system for a list of files in the lock’s directory, it must lie and omit those files (because otherwise the user could delete or replace them). When they ask the operating system to list all the running programs, the lock program has to be omitted (because otherwise the user could terminate it).

    All computers have flaws. Even software that has been used for years, whose source code has been viewed by thousands of programmers, will have subtle bugs lurking in it. Security is a process, not a product. Specifically, it is the process of identifying bugs and patching them before your adversary identifies them and exploits them. Since you can’t be assured that this will happen, it’s also the process of discovering when your adversary has found a vulnerability before you and exploited it, rooting the adversary out of your system and repairing the damage they did.

    When Sony-BMG covertly infected hundreds of thousands of computers with a digital lock designed to prevent CD ripping, it had to hide its lock from anti-virus software, which correctly identified it as a program that had been installed without the owner’s knowledge and that ran against the owner’s wishes. It did this by changing its victims’ operating systems to render them blind to any file that started with a special, secret string of letters: “$sys$.” As soon as this was discovered, other malware writers took advantage of it: when their programs landed on computers that Sony had compromised, the program could hide under Sony’s cloak, shielded from anti-virus programs.

    A car is a high-speed, heavy object with the power to kill its users and the people around it. A compromise in the software that allowed an attacker to take over the brakes, accelerator and steering (such as last summer’s exploit against Chrysler’s Jeeps, which triggered a 1.4m vehicle recall) is a nightmare scenario. The only thing worse would be such an exploit against a car designed to have no user-override – designed, in fact, to treat any attempt from the vehicle’s user to redirect its programming as a selfish attempt to avoid the Trolley Problem’s cold equations.

    Whatever problems we will have with self-driving cars, they will be worsened by designing them to treat their passengers as adversaries.

    That has profound implications beyond the hypothetical silliness of the Trolley Problem. The world of networked equipment is already governed by a patchwork of “lawful interception” rules requiring them to have some sort of back door to allow the police to monitor them. These have been the source of grave problems in computer security, such as the 2011 attack by the Chinese government on the Gmail accounts of suspected dissident activists was executed by exploiting lawful interception; so was the NSA’s wiretapping of the Greek government during the 2004 Olympic bidding process.

    Despite these problems, law enforcement wants more back doors. The new crypto wars, being fought in the UK through Theresa May’s “Snooper’s Charter”, would force companies to weaken the security of their products to make it possible to surveil their users.

    It’s likely that we’ll get calls for a lawful interception capability in self-driving cars: the power for the police to send a signal to your car to force it to pull over. This will have all the problems of the Trolley Problem and more: an in-built capability to drive a car in a way that its passengers object to is a gift to any crook, murderer or rapist who can successfully impersonate a law enforcement officer to the vehicle – not to mention the use of such a facility by the police of governments we view as illegitimate – say, Bashar al-Assad’s secret police, or the self-appointed police officers in Isis-controlled territories.

    That’s the thorny Trolley Problem, and it gets thornier: the major attraction of autonomous vehicles for city planners is the possibility that they’ll reduce the number of cars on the road, by changing the norm from private ownership to a kind of driverless Uber. Uber can even be seen as a dry-run for autonomous, ever-circling, point-to-point fleet vehicles in which humans stand in for the robots to come – just as globalism and competition paved the way for exploitative overseas labour arrangements that in turn led to greater automation and the elimination of workers from many industrial processes.

    If Uber is a morally ambiguous proposition now that it’s in the business of exploiting its workforce, that ambiguity will not vanish when the workers go. Your relationship to the car you ride in, but do not own, makes all the problems mentioned even harder. You won’t have the right to change (or even monitor, or certify) the software in an Autonom-uber. It will be designed to let third parties (the fleet’s owner) override it. It may have a user override (Tube trains have passenger-operated emergency brakes), possibly mandated by the insurer, but you can just as easily see how an insurer would prohibit such a thing altogether.

    Forget trolleys: the destiny of self-driving cars will turn on labour relationships, surveillance capabilities, and the distribution of capital wealth.

    View the original article here

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel
%d bloggers like this: