Miles Associates LLC

Jim Miles – IT & IT Security Consultant – Web Sites for Growing Organizations

Category Archives: IT Infrastructure

What ATT U-verse is doing to conserve IPV4 addessess…

… and some impacts.

As part of AT&T’s efforts to enhance our network to accommodate future growth, we will be making a firmware upgrade to your AT&T U-verse Gateway. Customers who have configured their network to use the 10.0.0.1 – 10.255.255.255 private Internet Protocol (IP) ranges within their AT&T U-verse Gateway will need to change to an alternate IP range. AT&T recommends changing to a 192.168.1.x IP range.

via http://www.networkworld.com/columnists/2012/052912-backspin.html.

Windows 7 services you may not need

Check these out; you might be able to disable services that you’ll never need: 10+ Windows 7 services you may not need | TechRepublic.

Tests show Windows 8 much faster than Windows 7

One thing you’ll like about Windows 8: Even though it’s only in its preview form, it’s already faster than Windows 7. And as development proceeds, it should only get even faster.

[PC World] ran Windows 7 and Windows 8 Consumer Preview on the same machine and found that Windows 8 was 14% faster than Windows 7 on the WorldBench 7, the magazine’s comprehensive performance benchmark. It also started up 35% faster, and was 50% faster when it comes to Web performance. Windows 8 lagged behind Windows 7 in an office productivity test by 8 percent, and was essentially tied with Windows 7 for a content creation test.

via Tests show Windows 8 Consumer Preview is much faster than Windows 7 – Computerworld Blogs.

Google Rolls Out Two-Factor Authentication

From TechCrunch: Google Rolls Out Two-Factor Authentication For Everyone. You Should Use It.

Another reviewer finds it unwieldy, from ZDnet: Google’s two-factor authentication: nice idea, but unwieldy.

I have implemented this on my Google account… In my past I have seen the effectiveness of 2-factor authentication, even participating in the invention of a two-factor system that worked for Windows Domain authentication where the endpoint members were not trusted.

I was amazed at how many times I had to reauthenticate after turning this on.  Every browser I use on every system I use (plus my phone), and a couple of the non-two-factor systems as is mentioned in the ZDnet review.  But, I got into them all without issue just following the instructions.

I recommend implementing this on your Google account, and I hope that more services roll out a similar tool soon.

10 things network admins need to know about Windows Phone 7

You’ve probably heard that Windows Phone 7 is not really a good option for deployment.   Here’s an article that explains why…  And here is one striking point:

8: It’s really a consumer device

When you read about the missing ActiveSync policies, you might have wondered why so many policy settings aren’t supported by Microsoft’s latest mobile operating system. Microsoft’s official answer to this question is that Windows Phone 7 was developed primarily as a consumer device, not an enterprise device. However, Microsoft hints that more enterprise features may show up in future phone updates.  [Emphasis mine – jm]

Given the poor perception of Microsoft in the consumer realm (at least in my opinion),  it would have seemed better to drive consumer demand via enterprise deployment.

via 10 things network administrators need to know about Windows Phone 7 | TechRepublic.

Verizon iPhone 4 Goes on Sale Feb. 10

Verizon iPhone 4 Goes on Sale Feb. 10 for $199

NEW YORK — Verizon Wireless and Apple Jan. 11 said they will launch a CDMA version of Apple’s iPhone 4, confirming what the mobile tech world has been speculating about since AT&T launched the iPhone in 2007.

Apple COO Tim Cook acknowledged the Verizon iPhone 4 handset is similar to the AT&T iPhone 4, from the FaceTime video chat application to the crisp Retina display.

The handset also sports the original iPhone 4’s LED flash, HD video recording, 5 megapixel camera and Apple’s signature glass and stainless steel design.

However, Cook said Verizon iPhone 4 offers one key feature difference: access to Verizon’s Personal Hotspot WiFi node capability, which connects up to five WiFi-enabled devices.

There is another big difference that may put off some more discerning consumers. Verizon’s iPhone 4 runs on CDMA technology, which does not allow simultaneous voice and data performance.

via eWeek.

Layer 8: Cisco co-founder now talks, lives, breathes turkey | Network World

Cisco was founded by husband-and-wife team Len Bosack and Lerner in 1984.  Says the Cisco Web site: “Husband and wife Len Bosack and Sandy Lerner, both working for Stanford University, wanted to e-mail each other from their respective offices located in different buildings but were unable to due to technological shortcomings. A technology had to be invented to deal with disparate local area protocols; and as a result of solving their challenge – the multi-protocol router was born.”

via Layer 8: Cisco co-founder now talks, lives, breathes turkey | Network World.

Google Encrypted Search News

Google’s Encrypted Search Seems to Stop SEO Poisoning

When you make a search on Google or another major search engine, you probably feel pretty confident that the first page or so of results will be relevant, valid and safe.   Not so! If you’re searching on a popular topic, there’s every chance that malicious links will turn up near the top due to a nasty technique called SEO poisoning…

When you go to https://www.google.com rather than just http://www.google.com, your search requests go through an encrypted SSL connection. When you click links from the results, the linked-to site does not receive the usual referrer information. A malicious site relying on SEO poisoning to attract visitors won’t be able to tell that you actually came from a search site and hence won’t serve up its evil code. Or at least that’s the thought.

via Google’s Encrypted Search Seems to Stop SEO Poisoning

Google Moves Encrypted Search to a New Site

Googles encrypted search engine, launched in May, has moved to a new Web address that isnt as convenient as its original one but that gives organizations the option to block the site for their users without locking them out of other Google services.

Originally offered at google.com, the encrypted search engine has been relocated to encrypted.google.com, a move prompted primarily by the requirement of schools and universities to block encrypted search engines for their students.

via Google Moves Encrypted Search to a New Site 

PS: This is my first post using 3G, from a car cruising down the highway.

Will femtocells ever get their moment?

Will femtocells ever get their moment?  Airvana exec argues mobile architecture challenges make them inevitable.

Although femtocells have yet to live up to the hype in terms of sales, femtocell vendor Airvana is still confident that they have a future in the mobile marketplace.During last week’s FutureNet conference, Woojune Kim, Airvana vice president of technology, outlined why his company is still bullish on femtocell prospects. The company believes carriers will come to see them as essential to offloading traffic on their mobile data networks as demand continues to grow.

via http://www.networkworld.com/news/2010/051810-femtocells-inevitable.html.

I have a femtocell in my home from Sprint (Airave).  It is pretty cool, although it releases calls (to the outdoor Sprint network) much earlier than you’d expect.  I think I need to move it to the top floor of my house for better wireless performance.  FYI, the Sprint Airave does NOT assist with data, only voice.

Facebook, Google Apps Use Soars in Enterprises

Palo Alto Networks surveyed Web application usage at 347 organizations and found Facebook, Twitter and other programs for communications and collaboration are all being used in enterprises to a great degree. Some 22 Google applications, including Gmail, Google Calendar, Google Docs and Google Wave, showed particularly strong usage, according to research from the network security firm. Of course, the widespread use of social network and other Web apps used in enterprises can wreak havoc on network security and regulations for financial services and health care industries.

Palo Alto Networks surveyed use of 750 applications across 347 organizations for its fifth Application Usage and Risk Report, released March 30. The company’s firewall appliances and software monitored the use of Web apps for the volunteering companies from September 2009 through March 2010.

Some of the stats are eye-popping. The bandwidth consumed per organization by social networking applications doubled from 18 months ago to 9GB in this new report, with Facebook consuming an amazing 5GB of these companies’ bandwidth counts.

via eWeek.  (Emphasis added by me — jm)