Selasa, 25 Januari 2011

Clearwire launches San Francisco network but Silicon Valley has coverage gaps

While the date is officially “tomorrow,” the press release for the Clearwire 4G WiMAX network launch in the San Francisco Bay Area is live late Monday night along with some very detailed coverage mapping that shows more than a few gaps in coverage both in and around San Francisco, as well as down the Peninsula and in many parts of Silicon Valley.


We’re laughing a little bit here at Sidecut HQ near downtown San Mateo, which is one of the bigger non-covered areas — though according to the Clearwire map if we walk down to the end of our block we should be able to see a signal. No worries here, since there are a bunch of buildings in downtown San Mateo that will probably get an antenna array sometime soon if the Clearwire model of quickly beefing up networks after initial deployment follows suit.


But the fairly incomplete coverage throughout the greater Silicon Valley region, especially in the south Bay towns of Palo Alto, Sunnyvale and Mountain View, means that Clearwire’s claim of users “never having to seek out Wi-Fi hotspots” may not be as complete as the company would like — and those gaps are right in the nexus of where a lot of computer/Internet industry folks live, work and play. Kind of an auspicious way to introduce a service to Silicon Valley, where skeptics abound. If those holes don’t get filled quickly Clearwire runs the risk of being tabbed as something not quite as good as advertised; and that rep is tough to live down in what is perhaps the nation’s most technologically savvy set of side-by-side suburbs.


From a marketing perspective, it’s worthy that Clearwire met its own-stated goal of launching the big markets of New York City, Los Angeles and San Francisco before year’s end, even with big budgetary concerns staring the company in the face. And covering the whole “Bay area” is a huge project with multiple challenges including the Bay itself (water isn’t friendly to Clearwire’s spectrum) and multiple small hilly patches that increase the difficulty factor. Still — kudos to Clearwire for being honest and showing where coverage is, and where coverage isn’t, allowing potential users to make their purchase choice using real, solid data. Verizon’s LTE maps, by comparison, paint the region a very simple 4G red — with no tower-level views for street-by-street coverage comparison. Will potential customers start to make such data part of their 4G buying decision? If so then Clearwire is far ahead in the information department.


(Clearwire coverage map close-up below; non-green areas indicate no 4G coverage.)



© 2011 MuniWireless. All Rights Reserved.

.

Share



Related posts:

  1. Silicon Valley to get wide-area wireless network (finally)

  2. Wireless Silicon Valley selects finalists: MetroFi, VeriLAN and Cisco-IBM team

  3. Wireless Silicon Valley going forward with Wi-Fi plans

Fake iPhones and Nokias make the world go round

I have just returned from a 3-week trip to Burma, Laos, Cambodia, Thailand and Malaysia, an odyssey that fascinated me and left me changed forever, not only because of the stunning magical landscapes and temples, but also because of the wonderful people I’ve met along the way. In between visits to Buddhist temples and shrines, I visited the local markets to see what people buy and sell, and to get a sense of how people live (or at the very least, what they eat). Local markets are even more fascinating than temples and museums, and being a gadget freak, gravitated quite naturally to the small shops selling mobile phones.


In Luang Prabang, Laos, I was fascinated by the fake iPhones, Blackberries and yes, Nokias (see this report: Nokia – One Out of Five Phones is Fake). Check out these Buddhist monks eyeing the latest fake iPhone (only $6), which I photographed in greater detail in the bottom photo. The interface is similar to the iPhone with the same icons for Safari, Address Book and more, except of course, you cannot download apps from the App Store (unless some super genius Chinese hacker has already figured out a way to do so). Most of the fakes are from China and they are quite impressive!


Laotian Monks

Monks shopping for fake iPhones in Luang Prabang, Laos


fake versus real iphone

Real iPhone (left), Fake iPhone (right) in Laos


© 2011 MuniWireless. All Rights Reserved.

.

Share



Related posts:

  1. T-Mobile G1 Android phone is out, but has serious flaws

  2. Wi-Fi Flowers from Toyota

  3. If you can’t beat ‘em, join ‘em

Smart Grid Security: threats and challenges in 2011

This is an interview conducted by Larry Karisny with Andy Bochman, Energy Security Lead IBM Software Group/Rational on the challenges and complexities in today’s smart grid security.


(1) There was a recent article in SearchSecurity titled IBM predicts rising mobile threats, critical infrastructure attacks in 2011. Are you sharing the same feelings of when, not if, it comes as it relates to a major breach of our electrical power grid?


Andy Bochman: My focus in the last several years has been almost exclusively on critical electrical infrastructure, to include the current grid as well as the few dozen spots where the emerging Smart Grid is starting to show itself. The grid is so large and so complex that it doesn’t take a Nostradamus to predict successful attacks on it in any coming year, especially as one of the primary enablers of new Smart Grid functionality involves massively interconnecting systems that were previously protected, at least in part, by their isolation.


2010 saw a very single-minded Stuxnet penetrate, but not disrupt, many enterprises with industrial equipment, including the military and utilities. More broadly aimed variants of Stuxnet may in the works, or in the wild already, but it would be hard to tell. But I don’t necessary forecast extraordinary trouble, as the promulgation of fear, uncertainty and doubt (FUD) doesn’t help anyone. Some security professionals like to put folks into fetal positions with scare stories. But I’ve found that people don’t get much work done when curled up in a ball of fear. I prefer to remember what my broker tells his clients during downturns, “generally speaking, the world doesn’t end.”


(2) We have seen a multitude if IEEE standards, different directions NIST, FERC and NERC, and organizations like Grid Net and GridWise Alliance positioning for the multi-billion dollar power grid security market. With all this posturing does there seem to be any agreed upon direction as to security models suitable for what what you earlier called in a Huffington Post article CIP or critical infrastructure protection.


AB: I’d say that even though it’s only a set of high-level guidelines, the embryonic NISTIR 7628 has the broadest fan base so far. I could be very wrong, but my sense is the NERC CIPs won’t be with us for the long run. No one seems to seems to value them. We’re waiting for practical implementation guides from the NIST CSWG teams in 2011 before state PUCs and other US and international grid security standards groups can point to 7628 as something approaching implementation-ready. As for enforceable standards, well, that’s the GAO’s primary complaint re: FERC. And FERC can’t fix that – only Congress can.


(3) There were big mistakes early on with smart meters security and now even questionable security in using ZigBee wireless network for the home Area Network (HAN). What was done wrong and how can we move forward on securing the demand side part of the smart grid?


AB: As the smart meter article noted, “Prominently missing are signed and encrypted firmware, secure (smart card) chips for key storage, unique cryptographic keys, and physical tamper protection.” These omissions (and others) were symptomatic of the root cause: a rush to deploy ahead of firm best practices, security standards and business models. Some security pro’s may question my response, but I’d say we need to slow down a bit, breath, review what we’ve done so far and check for gaps, before locking in standards, encouraging vendors to build to those standards, and encouraging utilities to deploy Smart Grid components in significant numbers. And yes, with millions of Smart Meters already out there, I realize this is a somewhat belated point!


(4) With all the complexity in security do you see any simple and economical solutions available?


AB: Not really. While the impulse to simplify is a good and desirable one from a business point of view, I’m afraid we’re going to have to meet the complexity of the Smart Grid with complex security solutions. That said, some tried and true security tenets bear repeating:



  • Defense in depth

  • Least privilege

  • Need to know

  • And this: in case those three don’t work every time – have plans B, C and D tested and ready


(5) Is there some kind of now solution that can be started with migration paths to future security solutions?


AB: Sure, though it’s clear that many “future proofed” solutions bring with them added risk. Let’s say you want to make your Smart Meter (or any other Smart Grid device) software remotely upgrade-able so you can add additional functionality or fix security problems on the fly and en masse. Remote control functionality always opens additional pathways for attackers, should they be clever enough to subvert whatever controls (or their lack) to prevent unauthorized access and use. For practical reasons, though, upgrade-able software and firmware is the only game in town, as fully manual updates to hundreds of thousands or millions of devices at a time would take a small army many months or years to accomplish.


(6) With all the guide line direction being given by a variety of organizations, is here any place to prove out these security solutions in an actual field test settings?


AB: Sure, and it’s happening right now, in dozens of pilot deployments already underway, with many more slated to begin in 2011 and 2012. In addition, several universities (see: the Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) and DOE national labs like PNNL, INL and Sandia are doing substantial research involving security, often using test beds that simulate field conditions.


(7) With threats now of fines and security assessments taking place, do you see power companies getting serious about grid security in 2011?


AB: This is a tough question to answer without a qualification first. If you equate heightened NERC CIP compliance activities with “getting serious about security”, then the answer is yes. However, one of the primary critiques of the CIPs as currently constituted in version 3 is that they are less than tightly aligned with the goal of making utilities demonstrably more secure against cyber threats. Some utilities complain that CIP compliance activities divert human and financial resources that could have been used to improve their organization’s actual security posture. Some say the CIPs have increased security awareness and are helping. The ground truth is likely that both are right.


(8) You have early on spoken in smart grid panels and have been a key speaker in various smart grid conferences. Is there any underlying security issue you have come away with when participation in these events and what are you upcoming speaking engagements?


AB: For me, the number one takeaway from the 2010 conferences was complexity. Trying to get our arms around the very many pieces of Smart Grid security challenge, including old and new technology, evolving business models, standards and guidelines, workforce awareness and training, the shifting threat landscape, recovery and survivability strategies … it’s just a heck of a lot to hold in main memory. But without consideration and attention given to all these things, you’re not really doing the job.


I’ll be a panelist at the Jan 31 FERC Technical Conference on the Smart Grid Interoperability and Security Standards. Will also speak at a few conferences over the next several months. Right now those likely include:



  • Smart Grid Security East

  • GTM’s Networked Grid 2011

  • Gartner Security & Risk Management 2011

  • CleanTech 2011


(9) You have the most popular blog as it relates to smart grid security. What are you hearing from those who following your blog?


AB: Mostly a hunger for more and better knowledge, especially among folks who are new to the domain. That includes cyber security pro’s who want or need to learn more about the electric sector, and utility personnel who need to get smarter on security issues and approaches. The blog exists to serve the community by facilitating knowledge transfer and letting folks know about upcoming events like new legislation, standards, conferences, best practices and lessons learned, etc. And so far, according to the feedback I get from (usually) happy readers, it seems to be working pretty well.


(10) What are your 2011 forecast in critical infrastructure protection deployments and research throughout the year?


AB: With so many balls in motion, it promises to be a thoroughly exciting and challenging year in the Smart Grid security space. At IBM, we’re putting the finishing touches on a white paper that considers the current and possible future of Smart Grid security standards. When that’s done, I plan to help advance work begun last year on EV and V2G security. We’ve been getting a lot of questions on that topic the last few quarters and that may very well become a 2011 white paper as well.


* * * * * *


Larry Karisny is the Director of Project Safety.org, consultant, writer and industry speaker focusing on security solutions for public and private wireless broadband networks supporting smart grid, municipal, critical infrastructure, transportation, campus, enterprise and home area network applications. He researches and deploys leading-edge security technologies that offer migration paths to current and future wireless networks and network applications.


© 2011 MuniWireless. All Rights Reserved.

.

Share



Related posts:

  1. GridNet: a look under the Smart Grid hood

  2. Detailed discussion of Smart Grid security with Bob Lockhart of Pike Research

  3. Smart Grid security alert: malicious worm attacking industrial sites

Wi-Fi Direct Update

Stephen Lawson at IDG News Service rounds up the status of Wi-Fi Direct: I've thought Wi-Fi Direct is quite promising since its introduction, and Lawson explains where all the support for the standard is to be found, along with why it's hardly available. Wi-Fi Direct is a simple way to create a kind of ad hoc, WPA2-secured network between two devices. It will likely be used for file transfer between mobiles and for printing when you don't have access to the network to which the printer is attached.



Lawson doesn't mention it, but I keep coming back to operating system support. No mobile OS offers Wi-Fi Direct yet, which keeps the most promising market from using the service. Mac OS X and Windows 7 also don't include support. To use Wi-Fi Direct, you need a device that advertises itself in the right fashion and can create the secure connection, and a client that can connect to it.



Wi-Fi Direct hasn't failed, to be sure, but we're still waiting for real signs of life.



The closest example I use routinely now is AirPrint, built into the iOS 4.2 release for iPhone, iPod touch, and iPad. Apple's solution is extremely limited in this release, allowing straightforward printing from any of its mobile devices to certain models of HP printer. The original AirPrint announcement said it would work with any Bonjour-capable device (that's the standard Apple developed and uses for service announcements on a network). One suspects we'll find that in the upcoming 4.3 release.



In the meantime, I use Printopia, a $10 utility that makes any Bonjour printer appears as if it's a qualified HP device. It also lets you 'print' to PDF to the computer on which it's running, and print a PDF directly to Dropbox.



With AirPrint, I select the action button in any program that supports the standard set of forwarding commands, like send via email, and choose the Print option. I'm given the choice to select among printers (real and virtual), and then the item is sent without fuss.



That's what Wi-Fi Direct should work like, with little additional fuss, and I'll be happy when that notion is realized in hardware and software.

Copyright ©2011 Glenn Fleishman. All rights reserved. Please notify us if you find this content anywhere but at wifinetnews.com or wimaxnetnews.com. Reproduction of full articles from RSS feeds is prohibited without permission.

So How Was Everyone's Christmas?

So How Was Everyone's Christmas?: "

...and we're back! It's a tradition here at Thoughts Media that we kick off the post-Christmas break by asking our community what they got for Christmas - specifically, any gizmos or gadgets. Or did you gift a loved one with some new piece of technology? Got any great tech support stories to share? I don't know about you, but whenever I'm over at a family member's house for Christmas, I inevitably end up sitting in front of their computer fixing/tweaking something. I don't mind though - I find it fun, and I like to help.

Speaking for myself, my tech stuff was pretty light this holiday - as it is every year - because if there's something tech that I need, I tend to buy it for myself when I need it, not when a holiday/birthday rolls around. I got a Kindle this Christmas from my wife, but, you guessed it, I bought it (with the help of a friend in the US) and gave it to her to give to me. Such is the life of a professional geek! ;-)

What about you? What did you do over Christmas, and did it involve technology in some way?


Smartphone Coasters: Stainless Steel Phone Stand

'Ask any Evo 4G user what they love about their phone, and eventually the word kickstand will come up. Having an easy way to hold the phone so it can be viewed is simply great, and is one of those things you wonder how you ever got along without. Fear not, non-kickstand enabled smartphones, the latest product from newPCgadgets.com called 'Smartphone Coasters' has you covered. These sleek and attractive stainless steel stands compliments any setting to provide an easily accessible base for your phone. The Smartphone Coaster holds all Smartphone's; including the popular iPhone, Droid, Windows 7, BlackBerry and dozens more.'

That old adage about the simplest things being the best ideas? I think that applies here. There's really not much to the product - it's a simple stainless steel stand, but if you're the kind of person that likes to have their phone/PDA/PMP/small tablet standing up at attention, this might be exactly what you're looking for. At only $3.99 per stand, and you can buy 'em in a six pack, they're affordable, functional, and a nice use of the 'KISS' principle. The company also has some other clever products that you might be interested in.



"

What The Geeky Got for Gifts

'If you got an iPad as a gift during the holidays, you certainly weren't alone. In a recent poll of holiday gift recipients, iPads accounted for a full 22.7% of all gadget or hardware gifts, making iPads the single largest category in our gift poll, outstripping the nearest runner-up by nearly 14% of votes. That runner-up was Amazon's Kindle - not surprising considering that the Kindle is the best-selling product in Amazon's history.'

It's a relatively small sampling size - less than 2400 votes, and only from people who read Mashable - but among the geek-set, there are a couple of stand-out points: the iPad was the #1 gift, more people got Macs (60%) than Windows machines (40%), Android phones let the way in the smartphone category with a hefty 50.3% figure (iPhones were 30%), but Windows Phone 7 devices at 10.3% just eeked out Blackberry devices (9.4%). Not bad for a brand new platform that most people still haven't heard about! Lastly, the Xbox/Kinect one-two punch clobbered the PS3 with a 54.3% figure versus only 11.9% for the PS3. The Kinect really is driving the Xbox 360 to new heights of popularity!