Tech Needs: Programmers, Plumbing, and Prayers

January 17, 2023

A recent survey by open-source technology firm WSO2 asked 200 IT managers in Ireland and the UK about their challenges and concerns. BetaNews shares some of the results in, “IT Infrastructure Challenges Echo a Rapidly Changing Digital Landscape.” We learn of issues both short- and long-term. WSO2’s Ricardo Diniz describes the top three:

“The biggest IT challenge affecting decision-makers is ‘legacy infrastructure’. Fifty-five percent of those surveyed said it is a top challenge right now, although only 39 percent expect it to be a top challenge in three years’ time. This indicates a degree of confidence that legacy issues can be overcome, either through tools that integrate better with the legacy platforms, or the rollout of alternatives enabling legacy tech to be retired. Second on the list is ‘managing security risks’, cited by half of the respondents as a current problem, though only 41 percent expect to see it as an issue in the future. This is not surprising; given the headline-grabbing breaches and third-party risks facing organizations, resilience and protection are priorities. ‘Skills shortages in the IT team’ complete the top three challenges. It is an issue for 48 percent and is still expected to be a problem in three years’ time according to 39 percent of respondents. Notably, these three challenges are set to remain top of the list – albeit at a slightly less troublesome level – in three years’ time.”

A couple other challenges, however, seem on track to remain just as irksome in three years. One is businesses’ transition to the cloud, currently in progress. Most respondents, concerned about integrations with legacy systems and maximizing ROI, hesitate to move all their operations to the cloud and prefer a hybrid approach. Diniz recommends cloud vendors remain flexible.

The other stubborn issue is API integration and management. Though APIs are fundamental to IT infrastructure, Diniz writes, IT leaders seem unsure how to wield them effectively. As a company quite familiar with APIs, WSO2 has published some advice on the matter. Founded in 2005, WSO2 is based in Silicon Valley and maintains offices around the world.

Cynthia Murrell, January 17, 2023

Backups: Slam Dunk? Well, No and Finding That Out Is a Shock to Some

January 9, 2023

Flash back in time: You have an early PC. You have files on floppy discs. In order to copy a file, one had to fiddle around, maybe swapping discs or a friend in the technology game with a disc duplicator. When one disc is bad, one just slugs in the second disc. Oh, oh. That disc is bad too. In the early 1980s, that type of problem on an Eagle computer or DEC Rainbow could force a person back to a manual typewriter and a calculating machine with a handle no less.

Today, life is better, right? There are numbers that explain the mean time between failure of speedy solid state discs. If one pokes around, there are back-in-fashion tape back up systems. Back up software can be had for free or prices limited only by the expertise of the integrator bundling hardware and software. Too expensive? Lease the hardware and toss in a service plan. What happens when the back up data on the old, reliable magnetic tape cannot be read? Surprise.

The cloud provides numerous back up options. One vendor, which I shall not name, promises automatic back up. The surprise on the face of the customer who stores high-value data in a uniquely named file folder is fascinating. You may be able to see this after a crash and the cloud believer learns that the uniquely named folder was not backed up. Surprise for sure.

I read “EA Says It Can’t Recover 60% of Players’ Corrupted Madden Franchise Save Files.” I am not into computer games. I don’t understand the hardship created by losing a “saved game.” That’s okay. The main point of the article strikes me as:

EA says that a temporary “data storage issue” led to the corruption of many Madden NFL 23 players’ Connected Franchise Mode (CFM) save files last week. What’s worse, the company now estimates it can recover fewer than half of those corrupted files from a backup.

It is 2023, isn’t it?

What’s clear is that this company did not have a procedure in place to restore lost data.

Some things never change. Here’s an example. Someone calls me and says, “My computer crashed.” I ask, “Do you have a back up?” The person says, “Yes, the system automatically saves data to an external drive.” I ask, “Do you have another copy on a cloud service or a hard drive you keep at a friend’s house?” The person says, “No, why would I need that?”

The answer, gentle reader, is that multiple back ups are necessary even in 2023.

Some folks are slow learners.

Stephen E Arnold, January 9, 2023

UK Focused on Apple and Google in 2023

January 6, 2023

While there continues to be some market competition with big tech companies, each has their own monopoly in the technology industry. The United Statuses slow to address these industry monopolies, but the United Kingdom wants to end Google and Apples’ control says Mac Rumors in the article: “UK Begins Market Investigation Into Apple and Google’s Mobile Dominance.”

The UK Competition and Markets Authority (CMA) will investigate how Apple and Google dominate the mobile market as well as Apple’s restrictions on cloud gaming through its App Store. Smaller technology and gaming companies stated that Google and Apple are harming their bottom lines and holding back innovation:

“The consultation found 86% of respondents support taking a closer look at Apple and Google’s market dominance. Browser vendors, web developers, and cloud gaming service providers said the tech giants’ mobile ecosystems are harming their businesses, holding back innovation, and adding unnecessary costs.

The feedback effectively justifies the findings of a year-long study by the CMA into Apple and Google’s mobile ecosystems, which the regulatory body called an “effective duopoly” that allows the companies to “exercise a stranglehold over these markets.” According to the CMA, 97% of all mobile web browsing in the UK in 2021 happened on browsers powered by either Apple’s or Google’s browser engine, so any restrictions can have a major impact on users’ experiences.”

The CMA will conduct an eighteen-month-long investigation and will require Apple to share information about its business products. After the investigation, the CMA could legally force Apple to make changes to its business practices. Apple, of course, denies its current practices promote innovation and competition as well as protect users’ privacy and security.

Whitney Grace, January 6, 2023

Google: Do Small Sites Need Anti Terrorism Help or Is the Issue Better Addressed Elsewhere?

January 3, 2023

Are “little sites” really in need of Google’s anti-terrorism tool? Oh, let me be clear. Google is — according to “Google Develops Free Terrorism-Moderation Tool for Smaller Websites” — in the process of creating Googley software. This software will be:

a free moderation tool that smaller websites can use to identify and remove terrorist material, as new legislation in the UK and the EU compels Internet companies to do more to tackle illegal content.

And what institutions are working with Google on this future software? The article reports:

The software is being developed in partnership with the search giant’s research and development unit Jigsaw and Tech Against Terrorism, a UN-backed initiative that helps tech companies police online terrorism.

What’s interesting to me is that the motivation for this to-be software or filtering system is in development. The software, it seems, does not exist.

Why would Google issue statements about vaporware?

The article provides a clue:

The move comes as Internet companies will be forced to remove extremist content from their platforms or face fines and other penalties under laws such as the Digital Services Act in the EU, which came into force in November, and the UK’s Online Safety bill, which is expected to become law this year.

I understand. Google’s management understands that regulation and fines are not going away in 2023. It is logical, therefore, to get in front of the problem. How does Google propose to do this?

Yep, vaporware. (I have a hunch there is a demonstration available.) Nevertheless, the genuine article is not available to small Web sites, who need help in coping with terrorism-related content.

How will the tool work? The article states:

Jigsaw’s tool aims to tackle the next step of the process and help human moderators make decisions on content flagged as dangerous and illegal. It will begin testing with two unnamed sites at the beginning of this year.

Everything sounds good when viewed the top of Mount Public Relations, where the vistas are clear and the horizons are unlimited.

I want to make one modest observation: Small Web sites run on hosting services. These hosting services are, in my opinion, more suitable locations for filtering software. The problem is that hosting providers comprise a complex and diverse group of enterprises. In fact, I have yet to receive from my research team a count of service providers that is accurate and comprehensive.

Pushing the responsibility to the operator of a single Web site strikes me as a non-functional approach. Would it make sense for Google’s tool to be implemented in service providers. The content residing on the service providers equipment or co-located hardware and in the stream of data for virtual private systems or virtual private servers. The terrorism related content would be easier to block.

Let’s take a reasonable hosting service; for example, Hertzner in Germany or OVHCloud in France. The European Union could focus on these enabling nodes and implement either the Google system if and when it becomes available and actually works or an alternative filtering method devised by  a European team. (I would suggest that Europol or similar entities can develop the needed filters, test them, and maintain them.) Google has a tendency to create or talk about solutions and then walk away after a period of time. Remember Google’s Web Accelerator?)

Based on our research for an upcoming presentation to a group of investigators focused on cyber crime, service providers (what I call enablers) should be the point of attention in an anti-terrorism action. Furthermore, these enablers are also pivotal in facilitating certain types of online crime. Examples abound. These range from right-wing climate activists using services in Romania to child pornography hosted on what we call “shadow ISPs.” These shadow enablers operate specialized services specifically to facilitate illegal activities within specialized software like The Onion Router and other obfuscation methods.

For 2023, I advocate ignoring PR motivated “to be” software. I think the efforts of national and international law enforcement should be directed at the largely unregulated and often reluctant “enablers.” I agree that some small Web site operators could do more. But I think it is time to take a closer look at enablers operating from vacant lots in the Seychelles or service providers running cyber fraud operations to be held responsible.

Fixing the Internet requires consequences. Putting the focus on small Web sites is a useful idea. But turning up the enforcement and regulatory heat on the big outfits will deliver more heat where being “chill” has allowed criminal activity to flourish. I have not mentioned the US and Canada. I have not forgotten that there are enablers operating in plain sight in such places as Detroit and Québec City. Google’s PR play is a way to avoid further legal and financial hassles.

It is time to move from “to be” software to “taking purposeful, intentional action.”

Stephen E Arnold, January 3, 2023

Ready for the Holidays, Facebookers and Googlers?

December 22, 2022

Despite an ongoing worker shortage, this economic downturn is proving to be bad for some folks’ job security. Business Insider: India reports, “Meta, Google Put Employees on ‘Notice Periods’ to Find New Role or Leave.” The write-up tells us:

“Facebook’s parent company Meta and Google are reducing staff to cut costs amid the economic downturn, apparently putting some of them on traditional 30 to 60 days ‘lists’ to find a new role within the company or leave. Meta plans to cut costs by at least 10 per cent in the coming months and has put out more and more workers whose jobs are being eliminated on its traditional ’30-day list,’ reports Wall Street Journal. On the other hand, Google’s parent Alphabet has reportedly deployed a similar approach, typically giving workers 60 days in which to apply for a new role if their jobs are set to be cut. ‘Facebook parent is looking to reduce costs by at least 10 per cent, people familiar with the plans said, while Google has required some employees to apply for new jobs,’ the report mentioned. …Last month, Google fired more than 50 workers at its incubator Area 120 and gave them extra 30 days to find another job at the company.”

A Google spokesperson assures us most of those folks were able to shift into another position. It is no coincidence the company has also suspended new hires while warning that any employee whose work is not up to snuff may find themselves out of a job. We also learn:

“In a company message viewed by Insider, Google Cloud sales leadership has threatened employees with an ‘overall examination of sales productivity and productivity in general’ and that if next quarter results ‘don’t look up, there will be blood on the streets’.”

Yikes. So much for Google being the most nurturing workplace around. As for the Meta-book, Zuckerberg has said the company plans to steadily reduce its payroll over the next year. But never fear. Whatever the fate of other workers, we suspect both Meta and Alphabet will protect their top executives’ lucrative positions. Which company is next? Salesforce perchance?

Cynthia Murrell, December 22, 2022

Are Smart Meters A Hacker Wonderland?

December 21, 2022

One reason to not upgrade your entire life to the digital cloud is an increased risk of hacking vulnerability. Interior and exterior security cameras, particularly baby monitors, are prone to hacking, but did you ever think smart meters for electricity and heating would be a target? Yahoo News reports that British households are being hacked by energy companies: “Switch By Stealth’: Alarming Rise In Homes With Smart Meters Being Cut Off Remotely.”

Smart meters are digital readers that monitor the amount of electricity a household uses, then sends the information back to the energy company. Smart meters provide energy companies with better information about energy consumption and billing. Smart meters also allow energy companies to remotely switch a customer’s payment method. The payment method is switched from debit payments to an expensive prepayment method.

What is worse is that when all the funds from the prepayment method are used up, the energy company will shut off the energy leaving a household without electricity and heating.

The British government is listening, but not acting quickly enough:

“It comes amid the worsening cost-of-living crisis, with the average yearly energy bill reaching £2,500 in October – a record high, and almost double the price it was last year. And energy bills are set to rise again in April, with estimates the average yearly bill could hit £3,500 per year. Campaigners are urging the government to honour their pledge to uprate benefits with inflation in the autumn statement next week, warning millions of low income households are already being forced into destitution without more support.”

It is understandable energy companies need to earn money to pay their employees, purchase energy, and keep the lights on, but why would they harm their customers? It would not be surprising if some bad actors wearing a white hat hack the smart meters and assist the people about to have their energy cut off.

Whitney Grace, December 21, 2022

Microsoft Software Quality: Word Might Stop Working. No Big Deal

December 20, 2022

I read a short item which underscores my doubts about Microsoft’s quality methods. l have questions about security issues in Microsoft’s enterprise and cloud products and services. But those are mostly “new” and the Big Hope for future revenues. Perhaps games will arrive to make the Softies buy Teslas and beef up their retirement accounts, just not yet.

Microsoft Confirms Taskbar Bugs, Broken File Explorer, and App Issues in Windows 10” reports:

If you use Windows 10, you might experience the following symptoms:

  • ?The Weather or News and Interests widget or icons flickers on the Windows taskbar
  • ?The Windows taskbar stops responding
  • ?Windows Explorer stops responding
  • ?Applications including Microsoft Word or Excel might stop responding if they are open when the issue occurs

The weather and news are no big loss in my opinion. Microsoft believes that Windows 10 users want weather and news despite the mobile phone revolution. (Remember Microsoft and its play to create a mobile phone? Yeah, that was spun as fail early and fail fast. I think of that initiative as a basic fail, not a fast or early fail. Plain old fail.)

The Taskbar and file manager are slightly more interesting. A number of routine functions go south for some lucky Windows 10 users.

But the zinger fail is that Microsoft Word or Excel die. Now that’s just what’s needed to make the day of a person who is working on a report at a so-so consulting firm like one of the blue-chip outfits in Manhattan, a newbie at a big law firm with former government officials waiting for the worker bees to deliver a document for the bushy eyebrow set to review, or a Wall Street type modifying a model to make his, her, thems partners lots of money.

These happy users are supposed to be able to handle stress and pressure.

I wonder if Microsoft executives have been in a consulting firm, law firm, or financial services company when a must have app stops responding. Probably not because these wizards are working on improving Microsoft’s quality control processes. Could Redmond’s approach to quality be blamed on an intern, a contractor, or a part time worker? My hunch is that getting blamed is not a component of the top dogs’ job description.

Stephen E Arnold, December 20, 2022

Who Can See Your Kiddies?

December 20, 2022

In an alarmingly hilarious situation, iCloud users are seeing photos of strangers on their devices. What sounds like a hacker’s gaff, actually proves to be a security risk. XDA Developers investigates what is going on with iCloud in, “iCloud For Windows Users Are Reportedly Seeing Random Family Photos From Strangers.”

People buy Apple products for its better security and privacy settings than PC devices. While Apple has an iCloud app for PC users, the app is not working as well as its fellow Apple products:

“Based on the reports, the corrupted files seemingly revolve around videos shot on iPhone 13 Pro and iPhone 14 Pro models. The footage in some cases is showing a black screen with scan lines. Though, what’s more worrisome is the random content that is showing up for some users. While it’s not confirmed yet, these photos of families, children, and other private moments could potentially belong to other people’s iCloud libraries. If this is the case, then Apple could get in some serious trouble. Unfortunately, deleting the iCloud for Windows app seemingly doesn’t solve this, as the issues are being reflected on the server.”

No one is certain what is causing the bug, but Apple needs to get on the problem. Apple will probably blame the issue on PCs being inept devices and the compatibility between Macs and PCs could be the reason. Apple is not infallible and here is a lesson in humility.

Whitney Grace, December 20, 2022

Need Holiday Cash? Some Gotchas Exist

December 19, 2022

Perhaps one’s mobile device is not the best place to turn when shopping for a loan. The Dailyhunt shares, “Nearly 300 Predatory Loan Apps Circulating on Google, Apple Stores: Report,” originally published at India.com. The brief write-up cites a recent report from Lookout, stating:

“Nearly 300 loan apps are circulating on Google Play and the Apple App Store that exhibit predatory behaviour, such as exfiltrating excessive user data from mobile devices and harassing borrowers for repayment, a new report has revealed. According to cloud security company Lookout, these loan apps exploit victims’ desire for quick cash to trap borrowers into predatory loan contracts and require them to grant access to sensitive information such as contacts and SMS messages. Some victims have reported that their loans were accompanied by hidden fees, high-interest rates, and repayment terms that were not as favourable as advertised. Lookout also found evidence that data exfiltrated from devices were sometimes used to pressure borrowers for repayment, which is a common threat tactic to disclose a borrower’s debt to their networks. Researchers at Lookout discovered 251 Android apps that had been downloaded over 15 million times. On the Apple App Store, the researchers discovered 35 apps that ranked among the top 100 finance apps in their regional stores.”

High interest rates, hidden fees, and bait-and-switch terms are problematic enough. Stealing personal information for more effective threats and harassment is next-level abuse brought to us by modern technology. It is not as if the companies are unaware there’s a problem. We learn Google recently removed over 2,000 personal loan apps from its Indian Play Store and ordered loan apps in Kenya to submit proof of licensing. It seems, though, more comprehensive measures may be required. Borrower beware.

Cynthia Murrell, December 19, 2022

Apple, the Privacy and Security Outfit, Has a New Spin for Pix

December 16, 2022

In an alarmingly hilarious situation, iCloud users are seeing photos of strangers on their devices. What sounds like a hacker’s gaff, actually proves to be a security risk. XDA Developers investigates what is going on with iCloud in, “iCloud For Windows Users Are Reportedly Seeing Random Family Photos From Strangers.”

People buy Apple products for its better security and privacy settings than PC devices. While Apple has an iCloud app for PC users, the app is not working as well as its fellow Apple products:

“Based on the reports, the corrupted files seemingly revolve around videos shot on iPhone 13 Pro and iPhone 14 Pro models. The footage in some cases is showing a black screen with scan lines. Though, what’s more worrisome is the random content that is showing up for some users. While it’s not confirmed yet, these photos of families, children, and other private moments could potentially belong to other people’s iCloud libraries. If this is the case, then Apple could get in some serious trouble. Unfortunately, deleting the iCloud for Windows app seemingly doesn’t solve this, as the issues are being reflected on the server.”

No one is certain what is causing the bug, but Apple needs to get on the problem. Apple will probably blame the issue on PCs being inept devices and the compatibility between Macs and PCs could be the reason. Apple is not infallible and here is a lesson in humility.

Whitney Grace, December 16, 2022

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta