What it’s like to play with a Super Computer?

I flew to Oak Ridge National Laboratory in Oak Ridge, Tennessee last week to “meet” Jaguar, the world’s third-fastest supercomputer. OK, it wasn’t quite as simple as that. I had to get special government clearance, go through a security checkpoint that was a full five miles away from the supercomputer, and then get briefed on how to behave around Jaguar Look but do not touch! were the simple rules I had to abide by.

Fully briefed and slightly intimidated, I was lead into a room roughly the size of a football field that houses the supercomputer, which itself is the size of a basketball court. For those who don’t follow sports: it’s really big.

It’s also incredibly loud. Like, jet-engine loud. Even with ear-protection, my head was buzzing a little when I left the room.

The noise comes from the cooling fans that are located below the floor and atop the computer, which are required to literally keep the computer from melting. If you’ve ever noticed your laptop getting a little hot when it’s sitting on your lap, multiply that by about 180,000 and you’ll get an idea of why all that cooling is necessary.

The fans blow air up from the ground that has been chilled down to 60 degrees Fahrenheit, using 4,800 lbs. of R134 coolant — the same stuff that cools your refrigerator and car air conditioner. When the air comes out the top of Jaguar, it’s 120 degrees.

Also in the room are are Kraken, the 11th fastest supercomputer, and Gaea, the 52nd fastest, according to the biannual Top 500 supercomputer list, which was announced Monday. All three are used by different groups: Jaguar is a Department of Energy supercomputer, Kraken is used by the University of Tennessee, and Gaea is the supercomputer for the National Oceanic and Atmospheric Administration.

Their presence add to the room’s noise and also creates a need for more storage space. That’s why half the room is taken up by the 20,000 1-terabyte hard drives that store all the data that the massive computers churn out.

It’s a lot of equipment, and there are the appropriate number of blinking LED lights emanating from all of the various components.

Meanwhile, computer engineers from Cray, the supercomputers’ manufacturer, are running around wearing blue lab coats performing maintenance. Just like on your home PC, stuff is breaking or failing all the time on Jaguar, so on-site engineers are constantly checking up on the eight rows of 284 cabinets that make up the computer.

They’re also working on a giant upgrade. Right now, Jaguar runs at 2 petaflops, which translates to 2 quadrillion (that’s 2 million billion) calculations per second. That’s fast, but the world’s fastest supercomputer blows Jaguar away: Japan’s K Computer runs at more than 10 petaflops.

Clearly, Jaguar is falling behind and needs more oomph. So the DOE decided to replace Jaguar’s processors and turn it into a 20 petaflop machine — twice as fast as K Computer. When the upgrade is finished in late 2012, the supercomputer will be appropriately renamed Titan, as it will likely be the world’s fastest.

I was particularly fascinated by how Jaguar handles input and output. The computer runs a stripped down version of Linux, the open-source operating system that powers most Web servers. Data and commands are entered into computer terminals similar to a PC interface, with keyboards and flat-screen monitors.

Output is where it gets really interesting. After data is spat out into spreadsheets, on-site imaging specialists transform that into stunning high-definition visualizations that can be viewed in a room one flight up from Jaguar. The viewing room has 27 high-definition projectors working in tandem to create wide-screen HD images of whatever the scientists cooked up using the supercomputer.

So messing around with a supercomputer is kind of like playing with your PC, except everything is many orders of magnitude bigger, faster, louder, brighter, and much, much more expensive.

Don’t worry, I didn’t touch anything.

Posted in Computers, supercomputer0 Comments

Cloud Computing Provider

Cloud Computing has been a hot buzz word for a while now and is getting hotter and hotter.

I have 3 important suggestions for anyone considering storing their data in the cloud.

#1 Before you spend a single penny with a cloud service provider first and foremost call their tech support and verify you are not stuck in an endless loop of being transferred around and make sure your call is not transferred over seas to India or elsewhere outside of the United States.

#2 Verify the strength of the company and how long they have been in business.

#3 If the provider you choose passes the above tests to your own satisfaction go ahead and sign up and pay for 1 month of service then upload some “test data” then wait a few days then log back in and delete your test data then call their tech support and tell them you accidentally deleted your data and see for yourself how fast they are able to restore your data from a backup.

You may be surprised at how good the  cloud provider you are testing really is or isn’t is or you may be disgusted but it’s your data and you owe it to yourself to test the cloud hosting provide you consider before you store real data on a server located who knows where that you can not physically touch.

I will be testing some cloud hosting providers and will provide a complete rating on my personal experiences later on for my blog readers to see themselves.

In the mean time I wrote an article in 2010 that explains exactly what cloud computing really is.

CLICK HERE to read that article.

Posted in CLOUD Computing, Data Storage0 Comments

Google and Microsoft both scan your email

Microsoft’s ads make Google’s email scanning sound sinister, however it’s own scanning  to block spam  isn’t much different.

Microsoft’s anti-Google “Scroogled” campaign is based largely on the contention that rival Google “goes through” private email in order to target ads at users based on keywords. And that’s technically true. It’s also technically true that Microsoft, too, “goes through” private email, though its intent is different: Microsoft’s Outlook.com email service runs scans not to target ads, but to block spam.

Still, the scanning itself isn’t really much different. For Stefan Weitz, Microsoft’s senior director of online services, this is all a matter of “semantics.” The intent of Google’s  “going through” email is what makes that “going through” a bad thing, compared to Microsoft’s “going through,” which is entirely benign, he said in an interview Tuesday.

It can be argued that Google’s intent to target ads is just as benign as Microsoft’s intent to prevent spam. Clearly, Microsoft doesn’t think so, and it cites surveys showing that most people don’t even realize that Google targets ads at them based on what they’ve written in emails, and that when they learn this is the case, many of them are appalled.

But the campaign is heavily focused on the scanning part, which makes Google’s targeting sound sinister. It also makes it sound a little bit like Google employees, rather than computer algorithms, are doing the scanning.

“In the most general sense of the word, the ‘scan’ is the same,” in both cases, Weitz allows. But, he says, the intent makes all the difference. Also, he contends, Google isn’t nearly “transparent” enough about what it does with the information it collects, either from searches or from email. Further, he argues, while Microsoft’s scans look for keywords that are red flags for spam , Google is looking for all manner of keywords for ad-targeting.

Fair enough, though there has been a mighty backlash against the Scroogled campaign. Weitz says it doesn’t matter much, since the people doing the lashing are mostly people in a “bubble” – technology workers and journalists. “Everyday people,” he claims, are fine with the campaign, because it lets them know something that many of them didn’t: that Google’s software “reads” their emails to target ads at them.

Last week, the San Francisco public-media outlet KQED reported, based on an interview with Weitz, that the Scroogled campaign is over. It’s not. Weitz attributes the misinformation to a misunderstanding between him and the reporter. (Fortune, like many other publications, cited KQED’s erroneous story.) He says he meant only that the Scroogled TV spots are over for now and that Microsoft is moving on to a new phase of the campaign to take on some other aspect of Google to excoriate. He wouldn’t say what aspect that might be, but he talked a lot about Google’s privacy policies for its search function, so that might be a hint.

The campaign launched in November. A few weeks ago, it started a petition drive to collect signatures from people opposed to Google’s email privacy policies. Microsoft boasts that it has drawn 3.5 million people to the petition site and that 115,000 people have signed it. That amounts to what seems like a rather paltry success rate — about .03%. Not so, Weitz insists, since once on the site, people must fill out a form. He says the ratio is “pretty good” and is “better than what the White House requires” for its “We the People” initiative.

Google has issued only a single, terse statement in response to the Scroogled campaign: “Advertising keeps Google and many of the websites and services Google offers free of charge. We work hard to make sure that ads are safe, unobtrusive and relevant. No humans read your email or Google account information in order to show you advertisements or related information.”

Posted in Google, Microsoft, News, Tech News0 Comments

Shopping With Dell

DELL SUCKS for small business

If you own a small or medium size business and are considering purchasing a DELL computer or server for your business. YOU NEED TO READ THIS.

This is an actual chat log I had with a DELL Business Representative.

As you can see the DELL Business Rep is unable to answer any questions in regard to purchasing a DELL Server.

UNBELIEVABLE? You may say.
Actually it’s believable when you look below and read the chat log I had with DELL.


This is an automated email sent from Dell Chat. The following information is a log of your session. Please save the log for your records.
Your session ID for this incident is 56622922.
Time Details
02/27/2013 06:31:39PM Session Started with Agent (Jennifer V)
02/27/2013 06:31:43PM Agent (Jennifer V): “Welcome to Dell US Chat! My name is Jennifer V. and I will be your Dell.com Chat Expert. I can be reached at us_dhs_chat_reply_2@dell.com or via voice mail at 1-800-379-3355 Ext-2160085.
How can I help you today?
By the way, there are several instances”
where chats get disconnected due to internet connection error (we don’t disconnect you on purpose), just in case this happens, what phone number can I reach you at?
02/27/2013 06:31:44PM Agent (Jennifer V): “hi”
02/27/2013 06:32:08PM Chris: “Hi Jennifer”
02/27/2013 06:32:29PM Chris: “my number is 407 792 6465”
02/27/2013 06:32:47PM Chris: “I want to build a dell server for a client of mine to replace an old server”
02/27/2013 06:33:44PM Chris: “I am looking here http://m.dell.com/mt/www.dell.com/us/business/p/poweredge-tower-servers
02/27/2013 06:34:16PM Chris: “I was unable to find any info for building a server to my specs on your website”
02/27/2013 06:35:01PM Chris: “can you point me in the right direction ?”
02/27/2013 06:35:19PM Agent (Jennifer V): “I’m glad that you chatted in today. I’ll be happy to assist you with your concern. =)”
02/27/2013 06:35:44PM Agent (Jennifer V): “you are looking to order a server for business, is that right?”
02/27/2013 06:35:54PM Chris: “Thank you”
02/27/2013 06:36:45PM Chris: “Yes correct this is for a client of mine and I am going to be replacing a server”
02/27/2013 06:37:46PM Agent (Jennifer V): “I okay”
02/27/2013 06:38:19PM Agent (Jennifer V): “Thanks for patiently waiting.:) You can contact our Business Department at 1-800-456-3355 or visit them on this link for assistance. They are open 8AM CST on weekdays and are closed on weekends. http://www1.us.dell.com/content/default.aspx?c=us&cs=04&l
02/27/2013 06:38:47PM Chris: “I like the poweredge T420 and want to get prices for that server with 8 gigs memory and 3 / 500 gig drives. 2 used and 1 as a spare.”
02/27/2013 06:40:01PM Agent (Jennifer V): “kindly please call them to check on the server that you needed because my tools here cannot configure a server”
02/27/2013 06:40:17PM Chris: “Do you not have any information on your website for prices and custom servers?”
02/27/2013 06:41:43PM Agent (Jennifer V): “sorry but not on not end. =(“

If you require further assistance, please visit us at support.dell.com

After this chat took place I did call the toll free number the DELL chat agent gave me and I was redirected from department to department to department where nobody was able to answer any of my questions or even give me a price quote for a new DELL PowerEdge T420 server with 8 gigs of memory and 3 / 500 gig hard drives. This isn’t rocket science but rather very basic information that I would expect a huge computer company like DELL to be able to answer.

It has since been 3 days since I called DELL and asked them to get me the information I requested and nobody has returned my phone calls or emails. I am going to stay on top of this to see if DELL calls me back or helps me.

I wont hold my breath.

In the mean time I am definitely NOT going to do business with DELL and am showing this to my client so they understand why I am not recommending using a DELL server to upgrade their network.  I am big fan of HP, IBM, and SuperMicro Servers. In this case my client kept mentioning the word DELL and seems to like the name.

After showing this to my client he agreed that DELL is not a good choice for his business.

Just imagine if you – a small or medium size business owner, IT manager, or a system administrator have this kind of trouble just getting a basic price quote. Can you imagine what a nightmare it would be to actually get support for a DELL server when it breaks and you need a replacement part in an emergency? I am sorry. Actually I am NOT sorry and will not subject my valuable clients & customers to this kind of nonsense.


UPDATE: 13 days later DELL returned my phone call and were not able to answer any of my questions and placed me in a never ending loop of transferring me from department to department. Needless to say my time is to valuable to do business with a a huge faceless company and I hung up the phone after being being transferred around for over 30 minutes.

Posted in Customer Service Stories, DELL, Dell Business, Dell Server0 Comments

Five Things to Look for While Testing a Mobile App

Have you ever wondered what kind of effort goes into building a mobile app for a smart phone?

When a professional tests a mobile app, he or she must do the job thoroughly- failure to do will almost always result in crucial problems being overlooked. To ensure that the application tester catches all problems there are five things they must look for during the testing process.

Make Sure the App Loads Quickly

One quality the tester must look for during the testing process is whether or not the mobile app loads quickly. If the app is loading slowly, then the tester needs to look for what is causing this problem. Some issues that may cause an app to load slowly are cluttered graphics, coding errors and bugs. Once the tester finds whatever is wrong, these problems need to be reported and corrected.

One Hundred Percent Accessibility

Another quality that the tester needs to check for is if the app is one hundred percent accessible to people with disabilities. In order for the app to be accessible, it must be able to work with assistive technology that makes mobile devices and smart phones accessible, such as screen readers, screen magnifiers, voice activated technology and Braille displays.

Check for Bugs

During the time the app is being tested, the tester needs to examine it with a fine-toothed comb to see if there are any bugs. Sometimes, the tester will need to check two to three times before he or she is confident that all the bugs are ironed out because at times, bugs can be missed during the first testing phase. Whatever bugs the tester finds, he or she needs to carefully report them, so the developers will best know how to fix them.

Check for Compatibility Issues

The mobile app also needs to be compatible with the device it is made for as well as other applications. Many apps will need to work with other apps on a mobile device, and compatibility problems can truly ruin a user’s experience. If the tester finds compatibility problems, he or she must carefully report them to the developers, so they will have an idea as to how they will address these problems.

Ease of Use

Finally, the tester needs to determine whether or not the app is easy to use. Some questions that the tester will need to be able to answer in order to make this determination are:

1. Are the app’s controls/options/buttons easy for the user to access?
2. Is it easy for the user to access the functions that the app was designed to do?
3. Is the app designed for the appropriate skill level? For instance, if the app is designed for a toddler to play with, is the skill required to use the app appropriate for that particular group.

If the tester keeps these five things in mind while testing a mobile app, then he or she can be sure the app is being tested thoroughly. Once the tester and developers are confident that the app passes all tests, then it is ready to be released.

Posted in App Development, APPLE, Droid, Ipad, Ipad development, IPhone, Iphone app development, Mobile App Development, Software Development0 Comments

The Use of Amplifiers in Fiber Optics

Most experienced network administrators, network engineers and cable technicians have a solid understanding of how fiber optics are used to transmit data / information.  While working with fiber hands on is a niche area reserved for those that specialize in cabling such as professional cable contractors and select employees from cable companies and phone companies. For anyone interested in learning a little more about fiber beyond text book theory this is a good article to better explain some interesting real world fiber optic facts.

Without fiber optic amplifiers, a signal on a network can only travel a limited distance. The average distance a signal can travel through a fiber optic cable without amplification is approximately 124 miles. This short range is not suitable for wide area networks, thus amplifiers are necessary in order to allow a network to function properly.

Three Places Amplifiers Are Commonly Used in Fiber Optics

There are three places where fiber optic amplifiers are most commonly used as it concerns fiber optic transmission. Amplifiers are used to boost the power of a signal before transmission over the optical cable even begins. This serves the purpose of extending the distance of the signal before any subsequent transmission is required. Line amplifiers are set up at carefully planned places along a network in order to maintain signal strength. It is these amplifiers that facilitate a signal’s long distance travel, and these amplifiers can keep the signal traveling for hundreds or even thousands of miles. Finally, Preamplifiers are used to raise signal levels upon reaching the input of optical receivers. The purpose of this is to facilitate adequate signal detection.

The Design of Fiber-Optic Amplifiers

Each type of amplifier is designed differently because they each serve different purposes. For instance, power amplifiers are designed to facilitate high gain. Preamplifiers are designed to keep noise to a minimum, and low noise levels are essential for these amplifiers to work properly. Because line amplifiers are required to enable signals to travel long distances over networks, they are constructed to keep noise levels low and allow for high gain.

Other places fiber optic amps are commonly located or used

There are other places on a network where fiber optic amplifiers are set up. A typical place other than the three aforementioned is in a switching node in order to make up for any loss that may occur in the switch fabric.

A Short History on Fiber-Optic Amplifiers

The invention of fiber-optic amplifiers is not a recent one. Most may think that it is, since the hype about fiber-optic networks has only been going on for the past 7 years or so. However, the first amplifiers were created in the year of 1987. These were called Semiconductor Optical Amplifiers, and they did not function well enough to impact signal transmission. These amplifiers were not nearly as advanced as they are now.

With the improvement of amplifiers over the years, a signal can travel over networks almost endlessly. These improvements were not made until recently, as researching and improving amplifiers was abandoned for the past couple of decades. Since attention has been given to amplifiers again, fiber-optic communication has improved dramatically and is becoming commonplace around the world.

Jason Kane from Orlando Florida writes about internet technology and fiber-optics from distributors like FluxLight.

Posted in Cable Company, Fiber amplifier, Fiber Optic Cable, Fiber Optics, Network Cable, Networking, Orlando Cable Contractor, What is?0 Comments

You need a touchscreen to really use windows 8

Before you run to a computer store in Orlando Florida or anywhere for the matter and buy a Windows 8 laptop or desktop computer you need to read this. Microsoft’s Windows 8 best features are not going to do you one bit of good unless you specifically have a touch screen computer or monitor.

If  you intend to use your mouse and keyboard then its best to stay far away from Windows 8 and use another operating system for your specific needs and wants.

The ability to tap, touch, pinch, and swipe your finger across a touchscreen computer – laptop is where the Windows 8 operating system really comes to life. You can still use Windows 8 without a touch screen monitor however that’s the same principle as tossing your TV remote control aside and physically getting up off your couch every time you want to manually change your TV station.

Remarkably few people are actually opening their purses or wallets to purchase touchscreen computers and or laptops. Just 7% of Microsoft Windows laptops sold through December of 2012 were touch screen computers.

One challenge is there are not many high quality touchscreen laptops on the market today. To give you an example. The retail giant Best Buy offers more than 700 different laptops for sale through local retail stores and online. Only 30 or so of those laptops have touch screens and only a handful of those 30 different make and model touch screen laptops are high quality. Most are made up of low quality hardware and are considered to be junk. Only two of the the 30 touchscreen laptops earned a high quality rating from consumers who bought them.

Another downside to these touchscreen laptops is they will cost you on average of $120 to $180 more then a non touch screen laptop computer. The most affordable touchscreen laptop is a 11.6 inch Asus VivoBook which sells for around $500 give or a take a few dollars while the full size touch screen laptops are around $625 and up.

Granted that’s not a huge expense for a laptop, this does provoke consumers to really think whether they feel its worth it to shell out the extra money for having a touchscreen laptop or touchscreen computer system.

Touch screen monitors and laptops are an are not an afterthought in Windows 8. Touch screens are the core to the entire Windows 8 operating system. The whole Windows 8 OS virtually begs users to touch the computer screen with their fingers. Windows 8 is outright clunky and cumbersome when used with a keyboard and mouse and will leave computer users feelings disappointed and left out unless they are using a touch screen laptop or monitor.

Getting people to adopt to touch screens on their desktop or laptop computers wont be an easy chore because people are use to using a real mouse and keyboard to control their computers.

Windows 8 is pretty cool yes but the reality is they are not going to replace desktop computers in the offices of businesses and other organizations. Windows 8 is best for home use for fun and entertainment.

Today’s touch screen technology is being heavily dominated by today’s smart phones such as the apple Iphone, Droids, and tablets which has shown very little vendor and consumer demand for larger size touch screens needed for touchscreen desktop and touchscreen laptop computers. This means suppliers are not manufacturing many touchscreens for computer systems, which also drives up the price for touchscreen laptops and monitors.




Posted in Computers, Laptops, Microsoft, Operating Systems0 Comments

Jailbreaking your iPhone

Should you or shouldn’t you “jailbreak” your apple device?  Ultimately the decision is up to you, but here are some things to consider. “Jail breaking” an apple device is overriding the operating system so you can use it in a manner that you may find better for you, or is it? Here are a few things to think about before taking the limits off your apple device. A simple Google search will help you find any which number of ways give you step by step instructions to jailbreak your phone, which at this time is not illegal but will in fact void your apple warranty.

Some of the features people like about taking the limits off apples iOS is that you can break free of iTunes, download mp3s from any website you wish without having to only use the format of an iTunes account.  Additionally, even though there are thousands of apps you can download for free through your iTunes account, once you override the iOS you will have access to even more apps that aren’t written for strictly apple. If you like playing games on your phone there are “cheat codes” available to you so you can have unlimited resources to play your favorite games. Also, If you don’t like the standard look of the iPhone screens, “jail breaking” your phone will give you the option of customizing it to your own look and feel. All these options are attractive reasons to go ahead and break free.  However, be careful, there is danger to taking the limits off your apple device as well.  Apple products are famous for not getting viruses and having problems with malware. If you decide to override your system and allow the protections that are on there to keep your device safe and secure,you are taking a risk and making your apple products vulnerable.  Iphone does not currently have anti-virus programs written for it because in and of itself it is not necessary, so seriously think about such things before putting yourself in a situation where you have rendered your favorite device inoperable. If you do go ahead and jailbreak your phone it is in fact fixable. You can easily connect to iTunes and restore all your defaults, however you will lose all saved information on your apple device.  Carefully weigh the options that have been provided here and make the best decision for you and you alone.


Posted in APPLE, Cell Phones, IPhone, Smart Phones0 Comments

Real Security Threats Facing Organizations Everywhere

In our day and age organizations of all sizes from large to small all face real security threats that are not to be taken lightly. Some of the more common everyday network threats network administrators’ deal with on a day to day basis are social engineering threats that are used to trick non technical computer users into downloading malware and other threats such as computer viruses. These threats are not new and are not going to go away. An alarming number of small and medium sized businesses not only in Orlando Florida but everywhere have fallen victim having their neglected computer network being compromised – hacked which leads to many dangerous activities such as data theft, computer network penetration and compromise which ultimately leads to having servers, desktop computers and other devices infected and potentially destroyed. One of the biggest problems I see is lax computer access by not having a computer / network policy in place which easily enables unauthorized users to access data that should be kept under lock and key and not available for all employees to have access to.

This is especially true for small and medium sized businesses in Orlando Florida that may not have the budget to hire a qualified network administrator on a full time basis which leads many small organizations to fall short of having a professional designed, build and properly maintained computer network.

Some other common computer, network, data theft and other cyber attacks are caused by:

Excessive Internal Data Access Privileges:
Employees with complete access to servers and data pose a tremendous internal threat if they turn against the company. So does anyone (including executives) who maintains inappropriate access rights to information after changing positions within a company.

Third Party Computer – Network Access:
Employees of third parties may have access to unencrypted data. Data stored in the cloud can be very dangerous especially for small and medium sized businesses.  If you are storing your data on a cloud do you know where your data is physically located and do you know who has access to your data? I promise you, you are not the only person to have access to your data if it is stored on a cloud. While the physical servers you rent or lease may be owned and operated by one cloud hosting company I can assure you the servers are likely to be housed in multiple data centers or facilities the United States and even overseas and are physically and virtually accessed by many other people which puts your data at risk of being seen, shared and or stolen from you. If you are going to use a cloud I highly recommend you get to know the company that will be hosting your cloud. Ideally if you can afford it would be in your best interest to own your own cloud and have it maintained by a local network administrator that you can meet in person and get to know.

Political Hactivism:
Political motivated hacking is on the rise, as illustrated by organizations such as Anonymous and Lulz-Sec. However, they assert that much of their success comes from finding easy targets, not because of any particular technical expertise. While you may or may not have control over whether you are hacked or not, you can make it far more difficult for an attacker to succeed.

Social Engineering:

Using lies, deception, manipulation and more to gain sufficient knowledge to dupe an unwary company (and any unintentionally yielding employee) is an age old technique. But it’s no longer limited to just the phone; it can be done over a social media network. Posting the details on FaceBook of every aspect of your upcoming “unplugged vacation” may just be the weak link of information that a scammer needs to take advantage of you and or your organization.

Internal Negligence:
Negligence is typically an offense committed by management when “they should have known better.”
Most successful data security breaches have some element of managerial negligence associated with them.

Lack of Transparency in Cloud Service Offering:
Never, never, never leave it up to blind trust that cloud service providers are implementing appropriate security measures and looking out for their customers.  Check cloud service providers thoroughly and as mentioned before, get to know whoever you are considering to be your cloud service provider.
As mentioned before, ideally if you can afford it would be in your best interest to own your own cloud and have it maintained by a local network administrator that you can meet in person and get to know.

Rogue Certificates:
Many whilelisting and application control systems depend on valid digital systems, which basically tell the systems, which basically tell the operating system, “You can trust me, because I am valid.” Using rogue or fake digital certificates that are in circulation, attackers and computer – network hackers can engage in almost undetectable attacks.

Mobile Devices in the Workplace:
A balancing act of convenience versus security, the growing use of personal mobile devices puts organizations at risk and leaves the company vulnerable to attacks. This is an especially sensitive area for companies that have yet to create and enforce a strong “Bring Your Own Devise” policy. Most have not.

Misuse (Malicious or Non malicious):
Misuse of entrusted organizational resources or privileges is exclusive to parties that are trusted by an organization, such as insiders and business partners. This also happens when policies are not clearly defined and enforced. Abuse flourishes when boundaries are not well established.

Physical Attacks:
Tampering, surveillance and a theft can be caused by a disgruntled former employee. Terminated employees who still have their security badges can easily gain access if the badge system was not updated upon termination.

Posted in Blogs, CLOUD Computing, Computer Viruses, Facebook, Malware, Security0 Comments

USB 3.0 Ports on Intel Sandy Bridge Motherboards and Operating System Installation

On the Intel Sandy Bridge motherboards including the Intel DH61BE motherboard I have noticed that keyboards and mice do not function when they are plugged into USB 3.0 ports when installing an operating system. The USB 3.0 ports are the blue USB ports. I also noticed while installing an operating system with these intel motherboards while the hard drive is plugged into a blue SATA port that the OS installation CD will not recognize that you have a hard drive present. If you have a USB keyboard and or USB mouse plugged into the USB 3.0 port which is the BLUE USB ports during the installation of an operating system, the keyboard and mouse will not function thus preventing you from installing an operating system. This is due to the fact that USB 3.0 functionality is being provided by a separate computer chip on the motherboard versus the legacy USB chip that is built in – integrated into the motherboard for the old school USB 2.0.

This means when installing an OS to ignore the blue USB and SATA ports on these intel motherboard and plug your hard drive and USB keyboard and mouse into the black ports. After you get the OS installed you can switch to using the USB 3.0 ports if you really want to but this isn’t necessary. Once the operating system is completely installed then the USB 3.0 ports will function.

Posted in Computer Repair, Computers, How To's, Motherboards0 Comments