I’d like to share a piece from Kate Dostart, associate editor for the networking group. She wrote this for SearchMobileComputing.com’s newsletter, and I thought it might be of interest. Please feel free to post comments here or send them to Kate in an email. If you enjoy this post, I also recommend checking out Rob Beschizza’s blog post on Wired.com’s Gadget Lab: 7 jobs that Nokia’s phone of the future will be good for.
My drama with finding a new phone continues — in part because I’ve been hesitant to commit to a phone I don’t love, and in part because I’ve been told that my old dual analog-digital phone is going to be shut off soon, so now I must upgrade. Other than the expensive BlackBerry Pearl I wish I didn’t have to pay tons of money or renew my contract to get, I finally found the perfect device — well, maybe. And no, it’s not the tattoo phone!
It’s Nokia’s new concept, the Morph. Maybe you’ve heard of it, maybe you haven’t. But this phone is amazing, and I’m in love. The only problem is, I’m eleven years too early for it.
Optimizing on nanotechnology, the device was first offered for viewing last month in conjunction with Museum of Modern Art’s “Design and the Elastic Mind” exhibition. The Morph bends, stretches, folds and twists — think Stretch Armstrong.
In addition to all that, this device will supposedly be the ultimate all-in-one-device. It can be shaped to fit your wrist like a watch or bracelet. Unfold it and it becomes a camera or, oddly enough, a device that can apparently detect whether your apple is at premium ripeness. (You can watch Nokia’s concept video on their site, or scroll down to view the short version below.)
The device is theoretically unbreakable and self-cleaning because of its use of nanotechnology. It’s also self-charging — simply having the device out in the sun, even if it’s in use, means its recharging as the entire device acts as a solar panel. That’s a convenient truth for anyone who hates to carry around extra batteries or cable wall re-chargers.
But outside how cool this future device is, one has to wonder, with mobile devices like BlackBerrys and Palms already so integral to so many people’s lives, what a device like this might mean to how everyone functions.
The iPhone is already disrupting trends with its crossover appeal to both the consumer and the business user. While phones specifically designed for children haven’t been much more than a niche market, would something like the Morph change that?
Could a device like the Morph become an integral element to our daily lives — a required device for school children, the ultimate clothing accessory for teenagers, the best business tool for the corporate worker and the most important device to pack for the traveler?
Nokia reports that the Morph, still more in the research rather than the development phase with full-time collaborating University of Cambridge researchers, is not expected to be ready for the market for another eleven years. So one wonders whether, by then, we’ll all just have microchips implanted into our wrists that can project holograms and do everything but the shape-shifting that the Morph is being designed to do.
But, if a cyborg comes back from eleven years in the future (though hopefully not after some Judgment Day) to save me from my own cell phone drama, I won’t turn down the Morph.
Hasta la vista, baby!
– Kate Dostart
[kml_flashembed movie="http://www.youtube.com/v/Zto6aTZM9t0" width="425" height="350" wmode="transparent" /]
A few hours after posting my story on Extricom’s and Meru’s approaches to wireless networking, I got an e-mail from Cisco expressing their disappointment in not getting to tell their “side of the story” on fourth generation wireless. Setting aside the fact that I e-mailed them for comment the morning before, I was curious about their take. Michael King, a research director with Gartner, had speculated that Extricom or Meru might be ripe for a Cisco acquisition within the next several years.
That possibility sounded pretty remote when I spoke with Cisco this afternoon. Ben Gibson, senior director of mobility solutions marketing for Cisco, said the company views channel layering/blanketing solutions (like Meru and Extricom use) as different, but not necessarily in a good way. He said these implementations, while they may or may not explicitly break standards, break the standards spirit and this has been shown, he said, to cause problems for other nearby networks. “I think it also introduces a lot of questions about such an approach to really scale properly,” he said. Cisco has been touting their Duke case study as the world’s largest .11n network, so it would seem they have scale down pretty well.
Cisco also wasn’t too happy with the designation of “fourth generation.” Gibson said most of the problems these systems solve have already been solved better by traditional players (namely Cisco). Sub-50 ms hand offs. Seamless VoIP calling. Ubiquitous, consistent wireless access no matter where you are or or how the wind is blowing. All with what they tout as better, more complete security.
“The next generation to me is, how do you turn it from a wireless network to a true mobility application network?” Gibson said. He said it was Cisco, not Meru/Extricom, who was paving the way for this fourth generation with integrated device chips that can boost wireless performance, with VoIP handsets, with location-aware applications.
So no love lost between Cisco and the new(er) kids on the block, but then again both Extricom and Meru didn’t particularly seem to enjoy being lumped together when I talked to them. It’s a pretty cut-throat industry, not the least because it appears primed to get much bigger over the next few years as enterprises start to look at the real possibility of going almost 100% wireless, meaning huge opportunities for the winners.
Enjoy watching the back and forth? Cisco’s mobility blog has posts that explain why they’re better than Aruba and, more amusingly, draw networking lessons from pre-marital classes. I couldn’t find blogs for any of the other wireless vendors.
As for me, I honestly couldn’t say who has the best approach, but feel free to leave your thoughts in the comments or, if you’ve had first-hand experience with some of the platforms, e-mail me at firstname.lastname@example.org. Who knows, maybe there will even be a CCNA Video Mentor in it for you if you’re interviewed.
Despite the occasional peril of lost connectivity, it’s a fact of modern business that more and more services are being sent overseas. Once primarily for application development and call centers, outsourcers are enroaching increasingly closer and closer to the heart of businesses. Over on IT Knowledge Exchange, several SMB-types discussed outsourcing their entire IT departments.
Fortunately, there are some things savvy networking pros can do to make themselves “strategic assets” (HR speak for “not outsourcable”) rather than “commodity services” (that’s a bad thing). We’ve got a more in-depth look up at SearchNetworking, but here are some tips boiled down from my conversations with IT veterans, analysts, and even an outsourcing company’s HR specialist:
- Those with purchasing power are less likely to be cut. If you’re buying something, it’s a good sign you understand the business needs on a higher level, and that you know how to …
- Think strategically. If what you’re absolutely great at is properly configuring routers or securing a VPN, guess what? So are a lot of other people, and often times they can do it halfway around the world just as easily. What they can’t do is look around your business and suggest ways to cut down on communication problems between sales and the warehouse.
- If you specialize, make sure your field is not going away anytime soon, and define your specialization broadly enough to be flexible in case the winds change. That means taking a hard look at the theory behind, for example, VoIP management techniques rather than simply learning how to install and maintain one brand of bandwidth management appliances.
- Don’t rely on certifications alone. As the HR specialist told us, it’s just as easy to get certified in India as it is in the States, and labor is still cheaper there.
- Don’t forget soft skills. Part of being an effective networking strategist means working with — and learning from — others outside of your domain. Leadership and communications courses can help you not only freshen up your resume, but also work more effectively outside of IT.
There’s also some really great advice in in the ITKE forums, and if you’ve got a question about what to do with your own career, you might try asking there: Generally the members are more than willing to help out, and many of SearchNetworking’s resident expert tipsters are active participants. Some career-oriented posts I came across:
Japan is so cool. Granted, I’ve never been there, but I’ve been appreciating sushi, Hello Kitty, Akira and karaoke for many years now. Much like the rest of America, I’m considering a Honda as my next car purchase instead of a domestic model.
Another reason Japan is beating the U.S.? While our cities quibble over getting FiOS into poor neighborhoods along with the rich ones, Japan — where they already have fiber optic cable in most cities — just launched a satellite to provide high-speed Internet to all of the country, including rural areas.
The satellite, named Kizuna, will “allow super-high speed data communications of up to 1.2 Gbps, which would make it the fastest in the world,” according to Yahoo News.
Kizuna is said to also be designed to provide connectivity in case of problems with the terrestrial infrastructure, such as would result from an earthquake… or, one would hope, giant monster attacks.
Amazon got back to my questions about whether or not Amazon’s Kindle eBook reader violates net neutrality. Their answer: No. Heather Huntoon, a PR manager for Amazon e-mailed me:
No, Kindle service does not violate net neutrality because the network operator does not preclude or degrade other traffic on its physical network. It’s more like a corporate VPN running on the Internet: special devices (company-approved PCs) are needed to use it, and the content transmitted is proprietary, yet other VPNs could operate over the same physical network.
Interesting take. I’m not sure if that meshes with how proposed legislation sees it, but I think that is part of the problem: The proposed FCC mandate is too unclear as to what falls under its domain. And as Ike Elliott points out, the bill covers neutral access over “broadband telecommunications networks, including the Internet.” Whether Whispernet counts as a VPN or Internet access, it is definitely a broadband connection and so could presumably fall under these guidelines.
Imagine signing up for broadband service that forces you to buy your computer from the ISP, only allows you to download DRM’d content from them, and only lets you visit pre-approved blogs – which they charge you a per-blog fee to access.
This pretty much summarizes network neutrality opponents worst fears, but it’s also a pretty accurate description of Amazon’s Kindle eBook appliance, which telecom consultant/blogger Ike Elliott told me might not exist if net neutrality regulation isn’t properly thought out. The device connects using Whispernet, billed as a “wireless delivery system” powered by Sprint’s EVDO wireless data network.
As far as I’ve been able to research, Amazon is acting as a virtual network operator in this case, not much different than Virgin Mobile or any other MVNO. Nobody would argue that these carriers aren’t restricted by the same rules that govern carriers that own their own networks. But even if Sprint is considered the service provider, someone is ultimately restricting ways an Internet connection could be used.
To review, the currently proposed net neutrality legislation seeks:
“to preserve and promote the open and interconnected nature of broadband networks that enable consumers to reach, and service providers to offer, lawful content, applications, and services of their choosing, using their selection of devices, as long as such devices do not harm the network; and
“to safeguard the open marketplace of ideas on the Internet by adopting and enforcing baseline protections to guard against unreasonable discriminatory favoritism for, or degradation of, content by network operators based upon its source, ownership, or destination on the Internet.”.
A quick checklist:
- Does Whispernet let consumer’s use their own device? Nope.
- Reach lawful content of their choice? Nope.
- Use applications of their choosing? Nope.
- Discriminatory favoritism based on source, ownership, and destination on the Internet? Yup.
So why hasn’t there been an outpouring of public outcry against Amazon, a major network neutrality proponent? The simple answer is transparency. Amazon has always been very upfront about what the Kindle is and isn’t for, unlike, for example, Comcast, which has faced a backlash after is going back and forth on whether, and how, they throttle Internet connections. Another aspect might be Amazon’s radical departure here from traditional service models: There’s no monthly fees, no set usage agreements, just a pay-as-you consume model.
Elliott told me that while anti-competitive behavior by service providers is a real concern and must be regulated, he worried that net neutrality legislation which is too vague or too strict could cut out some possibilities for future devices and service plans like the Amazon Kindle. He’s blogged some other thoughts on what he thinks is wrong with the Markey bill.
Meanwhile, I’ve called and e-mailed Amazon for their take on whether or not the Kindle is “net neutral” and how this jibes with their public statements. I’ll post an update when they get back to me.
Update: Amazon responds, saying Kindle doesn’t violate network neutral principles.
Open source has been buzzing lately: Gartner identified it as one of the top 10 trends for 2008, and last week Microsoft announced it was publishing 30,000 pages of documentation for Windows Server 2008 and Windows Vista and launching an “Interoperability Initiative.” Google is pushing open applications and development of the new Android operating system, while Verizon claims to be opening its network.
In the networking industry, however, while open source adoption seems to be growing at a good clip, I don’t see much hoopla about it. So I’ll forgive you if you missed Shamus McGillicuddy’s article about the launch of ZipForge, a new website Alterpoint developed to support its ZipTie open source network configuration product. The ZipForge site provides a place where AlterPoint vendor partners can post interoperable ZipTie components that developers and users can download, review, and contribute to.
It would be great to see users take advantage of this repository to consolidate other networking-specific software tools, much like a true SourceForge (from which the new site partly takes its name) for networking pros. According to the article, networking has experienced less of an upsurge in open source because the technology itself is so reliant on hardware. While that may be true in a basic sense, software is becoming far more important and familiar. There are already several open source programs that networking folks use regularly, and that list is bound to expand.
Network engineers have long used open source software to run routers, VPNs and VLANs on run-of-the mill servers. Snort, OpenNMS, Nagios and Nessus are staples in networks big and small. And the popularity of Asterisk, the open source IP telephony platform, continues to grow in leaps and bounds.
Open source is definitely a part of the network, but I think that’s how most networking pros view it — as just a part of the network. They choose it because it works well, it interoperates, or it’s cheap, and they don’t get too caught up in the idealism and spreading the word about the benefits of open source. Also, most networking pros wear so many hats that they can’t spend a lot of time thinking about one system or product. They are even less likely to use that time evangelizing or flaming posts over at Slashdot.
I recall a network administrator I met a while back at a trade show. He had installed a few Vyatta routers, and he thought they were fantastic. But he was also in the throes of rolling out Avaya IP telephony to multiple locations and installing a new supply chain automation system. So while he was happy with his open source routers, they probably weren’t the first thing on his mind. The buzz about open source in the network is there, but sometimes you have to listen hard to hear it.
I spend a lot of time, possibly too much time, thinking about geek culture, and apparently I’m not the only one.
No sooner had I blogged about pundits trying to define the image of the “new” networking pro than I received a fierce note from one of our readers. His complaint was that the characters portrayed in our IT Guy comics didn’t resemble him, or any of the IT pros he worked with. “I looked like Jake ‘the Snake’ back in the 80s, and with no fat gut,” he wrote.
A week or so later, eWeek ran a story about one Microsoft employee’s blog, which aims to “dispel the tech nerd stereotype.” The blog, Microspotting, is written by Ariel Stallings, self-proclaimed “Web 2.0 geek,” who seeks out Microsoft “geeks who are passionate about what they do” and profiles them on her blog to point out that the evil Microsoft empire isn’t quite what outsiders might think. As cited in the eWeek article, Ariel has profiled the guy who rides everywhere on a Segway, wearing a golden helmet, as well as a goth lady who wears petticoats and top hats to work.
Similarly, Elizabeth Todd Doyle’s piece on fangrrls at sci-fi conventions; points out how female fans of science fiction and comic books are going against the grain of the geek stereotype.
It’s probably not necessary to point out that some people would say riding a Segway or wearing a top hat to work — or attending a sci-fi convention — is a pretty geeky thing to do, regardless of your gender or whether you wear a pocket protector.
Also, I’m not bothering to differentiate “geek” from “nerd” for the purposes of this blog, but I should at least acknowledge that for some, “nerd” is much more negative in connotation.
One thing I find interesting in these comments on geek stereotypes is the perception that John Hodgman, the PC guy from the Mac VS. PC ads (mentioned in both the above articles) represents the image of a geek (as foil to Justin Long’s “hip” Mac…) and that somehow the geek image needs to be remedied.
But don’t most of us actually prefer John Hodgman to Justin Long, anyway? As Wired blogger Pete Mortensen remarks, “The one enduring criticism of the ads is that John Hodgman’s PC is funnier and more likable than Justin Long’s sleazy hipster doofus Mac.” And Anna Johns on TV Squad.com also points out that “super-hip Mac” actor Justin Long “has played some memorable geeky roles in Galaxy Quest and Dodgeball.”
Perhaps some definition is needed here. Obviously, not all IT workers are (or wish to be known as) geeks. Neither are all geeks computer-savvy. At the moment, I like this broad definition from Wikipedia’s (unsurprisingly lengthy) entry for geek:
A person with a devotion to something in a way that places him or her outside the mainstream. This could be due to the intensity, depth, or subject of their interest.
Under that definition, you could have not only your computer geek, math geek or band geek… you could also have an architecture geek, a horticulture geek or even a baseball geek! So, embrace your inner geek — and if somebody calls you a geek, don’t quibble about stereotypes, but take it as a compliment.
Or maybe I should really be talking about nerds, after all…
[kml_flashembed movie="http://www.youtube.com/v/-xEzGIuY7kw" width="425" height="350" wmode="transparent" /]
When the network was built like a castle, located in one static location, it was easier to have perimeter defense–the castle walls, the moat and hill (i.e., the firewalls)–protecting the royalty… I mean, data. Nowadays, there’s more royalty (information) to keep track of and they don’t stay put within the safe walls of their core network/abode.
Needless to say, security is a primary networking concern (as was seen in a SearchNetworking.com survey conducted last fall polling more than 1,200 readers). I blame this largely on the increase of wireless (many wireless network security best practices are mysteries to most), the growing deployment of mobile devices (anywhere access), and the fact that not only are corporate devices travelling well beyond office-building walls, but the workers are too.
Sixty percent of enterprises have wide-spread remote access–where 50% or more of the workforce have remote access to the internal network–according to Yankee Group who surveyed 200 enterprises last summer. Senior Analyst of Enterprise Research in Network Security Phil Hochmuth of Yankee Group reported that three years prior, less than 25% of organizations supported wide-spread remote access.
With such an increase in such short amount of time, it’s no wonder network administrators are worried about how to secure and manage all these people. I realize I’m one of them: in the past three years, the companies I have worked for either allowed me to work remotely or involved me working from home entirely; I’m living this statistic, as many of you now are too, I’m sure.
Office space can be costly for an enterprise, and for the workers–so can gas, auto-repairs, and overall transportation. But on top of avoiding commutes, there’s a business benefit; mobile workers in jobs like sales or consulting, which require them to travel, are able to access data, fill orders more quickly, and quicken the overall pace of business transactions because they no longer lose as much time when they’re on the road. Unfortunately for the system administrator, all of this remote interaction puts stress on the network.
Hochmuth said “increased employee productivity is the main driver behind the move to open up internal networks for anywhere access, and SSL VPNs are emerging as the main tool enterprises use to provide this type of access.”
Independent research firm Amplitude Research commissioned by VanDyke Software found in their Fourth Annual Enterprise Security Survey that organizations are heightening their commitment to securing data communications. Secure remote access was the number one security management issue facing their company, according to their 2007 survey.
“The survey findings correlate to what we see happening in the field,” said Jeff P. Van Dyke, president and founder of VanDyke Software: “There’s a lot on the plates of the systems administrators, and with securing remote access a top issue and secure file transfer showing significant increase as a top issue to manage within the enterprise, VanDyke Software focused on new features for SecureCRT 6.0 and SecureFX 6.0 that make life in these areas so much easier for IT and network administrators.”
Hochmuth said “enterprises are literally opening up for business when it comes to supporting the ability of their employees to work from anywhere.” And VanDyke Software is one such company “opening up for business” to meet the needs of floundering network administrator’s who have to implement and support the increasing number of remote workers for their companies.
I suspect many more are aiming to follow suit.
Over on Slashdot there’s a lively discussion of IT ethics, and what sort of codes (no pun intended) network managers work by. Three camps of “ethical rules” came up:
- Rules workers bring with them
- Rules enforced by corporate policy
- Rules built into networking systems themselves
Of course, these guides regularly conflict. Scanning personal e-mails is high-profile topic, but it’s certainly not the only ethical dilemma confronting the conscientious network admin. I once knew a network administrator who routinely scanned and copied all mp3s from networked personal folders into his “master database,” which took up a few spare gigs of unused space and more than a few spare hours of his workday, spent chilling out to the Grateful Dead. He didn’t last too long, despite his impressive collection of B-sides.
Which rules are the trump card when it comes to acting ethically? Are ethics ever written into your job description? Have you tried building in ethical rules into your networking infrastructure? Tight permission access comes to mind, but that’s a security no-brainer at this point.
Unfortunately, most of the networking engineer guidance we found was pretty minimal, such as this rather vague section in SAGE’s Code of Ethics:
- I will strive to build and maintain a safe, healthy, and productive workplace.
- I will do my best to make decisions consistent with the safety, privacy, and well-being of my community and the public, and to disclose promptly factors that might pose unexamined risks or dangers.
- I will accept and offer honest criticism of technical work as appropriate and will credit properly the contributions of others.
- I will lead by example, maintaining a high ethical standard and degree of professionalism in the performance of all my duties. I will support colleagues and co-workers in following this code of ethics.
Nary a word on reading e-mails, logging chats or jamming out on borrowed binary.