Mississippi Library Commission NSB Info

discussions and news

Want to receive MissIN alerts?

If you are a Mississippi public library system director or technical contact, and you wish to receive text alerts concerning system wide outages or weather related emergencies affecting networks, you may receive information on signing up by sending an email with your request to helpdesk@mlc.lib.ms.us. We will respond with the codes you need to opt in to the Missin alert network.

Monday, January 24, 2011

Technology Tip ---turn your printer off

Technology Tip

Turning Off Your Printer
Today's electronics are deigned to be safe and economical to operate. However, leaving devices on 24/7 does eat a substantial amount of electricity, regardless of the device.

Power adaptors are notorious for using more power than the device itself. This is especially true of cell phones, for example.

It comes down to how much you're going to be printing. Most people usually use their computers off and on all day, so they leave them on all day and then just turn them off at night to save some power and also for safety reasons. All-in-One printers may also be used as a fax, so they need to stay on all the time regardless

If you're going to be printing off and on all day long, you might as well just keep the printer on until you're completely finished. If you're just going to print one item now and then, and then not print for a few hours, turn it off. Most printers turn on very rapidly, without long warm up cycles.

The main two reasons to turn your print off are: electricity usage and ink cartridge print heads drying out. The bigger of the two issues may be the drying of the print heads, because inkjet printers really don't use that much electricity. The newer ones use even less, but older printers (unless a laser printer) don't really use that much either.

Most ink cartridges have some sort of a capping mechanism that saves the head from any outside air that may come through when the printer is turned off. But, if you leave the printer turned on all the time when not using it, you're just asking for your cartridges to dry out, and will have to buy another cartridge that much sooner than normally would be the case. If your print heads dry up or clog, your printing quality will suffer also.

Therefore, always make sure you turn your printer off when not using it. But remember to turn off your printer by the On/Off button, and not by flipping your power strip or UPS. When you use the printer's own On/Off switch, the printer will engage its capping mechanism to prevent cartridge dry-out. Otherwise, it will freeze in whatever state it was in, and your cartridge will still be at risk for drying out

Test

test

Wednesday, December 8, 2010

Wednesday, November 24, 2010

Happy Thanksgiving!

Wishing you and yours a happy and blessed Thanksgiving !!! MLC Network Services

Thursday, August 26, 2010

itunes and targeted scams

Please take a moment if you are an itunes user and read this article...
http://usat.me?39845800

Tuesday, July 20, 2010

Ten Game Changing IT Technologies

Ten Game-Changing IT Technologies
July 2010
Randy Muller, Global Knowledge Instructor

In the past few years, there has been an explosion of new technologies to hit the marketplace. These technologies have had a huge impact on how we work, how we play and how we communicate. We can keep in touch with others and interact with computers in ways not even thought of a few years ago. Here is a look at some of the most prominent new technologies that have proven to be "Game Changers."

Tablet/iPad - If there is one device that has the potential to radically change how we perceive the use of computers and computing devices, it would be Apple's iPad. But before the iPad can lay claim to this title, it must first prove that it has the capacity and viability to replace laptops, net books, and tablets. One of the unique features of the iPad (for now at least) is the use of a touch-screen display. The iPad has the potential to finally advance the acceptance of the multi-touch screen and perhaps even push it ahead of the ubiquitous mouse interface in use for the past few decades.
What the iPad must do is prove that it is not a niche product used only by geeks and those who wish to be technology trend setters. The iPad also must overcome the fact that it lacks many commonly accepted features found on laptops including a physical keyboard, USB ports, and a Webcam. If Apple can do this, then the iPad will truly become an IT game-changing product. For the time being, however, many people see it more as a glorified iPhone or a substitute for Amazon's Kindle than as a true laptop replacement.

Cloud Computing - In its simplest state, cloud computing is the delivery of hardware and application services over the internet on demand. This is done as an alternative to hosting and maintaining your own servers and application software. In cloud computing, businesses only pay for the resources that they consume; think of your electricity bill, you only pay for what you use. Businesses that host services and applications in the cloud improve overall computer utilization rates, as servers are running at or near full capacity from clients connecting remotely. Cloud computing offers several models:


1. Software as a Service (SaaS) - Providing an application that clients can access through the internet.
2. Utility computing - Where storage and server computing power available when required
3. Web and Platform Services - Providing a platform where developers can create applications that can be accessed by clients through the internet. Instead of using your own server infrastructure, you use these remote servers. Microsoft's Azure platform provides just such an environment.

Unified Communications - We live in a highly connected world (perhaps too connected at times) with numerous communication technologies all competing for our attention. These disparate communications technologies were all developed and have grown into commonly accepted use separate from one another. In order to use these technologies, we may have had several accounts: one for conferencing, another for email, a third for instant messaging, and yet another for voicemail, and perhaps even other accounts. Each of these systems most likely had separate user names and passwords. In order for users to access them, they would have had to remember them (or write down). Network and telephony administrators had to keep these different systems working, sometimes with limited success and much difficulty.
Unified Communications combines these different systems together into a single communications platform. Now your telephony system can not only handle your voicemail, but send you an email letting you know that you have a voicemail. Conferencing is no more than a click away from a contact in an email. You can see if a colleague is available by checking their on-line presence. You can also receive IM's from outside clients on your internal IM system. A single communications platform - makes it easier for users to keep in contact with others and easier for administrators to maintain.

Virtualization - Virtualization the art and science of having a single physical server host several virtual server roles. The virtualization of server farms is accelerating as IT managers have to realize the economic benefits derived from having fewer physical boxes (electrical, cooling, deployment, green computing, and software deployment). There are several virtualization products including Microsoft's Hyper-V and VMware.

Virtual Desktop Infrastructure (VDI) - Virtual Desktop Infrastructure (or Interface) is another method to provide centralized management and deployment of user virtual desktops. Users will require a constant connection to a network as they will access their own personal desktop remotely. This improves the user's desktop flexibility, gives IT staff an integrated management and assists with business continuity. Virtualization and cloud computing is where much of the IT infrastructure is headed.

Electronic Readers - Amazon's Kindle, Barnes and Noble's Nook, Sony's Reader, take your pick. They all have ability to store hundreds or even thousands of books and documents. The typical user will mainly use these devices to read books, newspapers or other such periodicals. The electronic readers with larger screens can be readily used for technical references. What makes these such alluring devices and a game changer for 2010 is their capacity, battery life and small footprint. Businesses could pass out electronic readers for meetings in-lieu of paper documents; reference material for a product could be accessed through an electronic reader. While these are not going to herald in the "paper-less office," it is changing how we read and maintain documents and books.

Smart Phones - There are three smart phone platforms that have the majority of the market share: Apple's iPhone, the BlackBerry and Google's Android. Smartphones represent the fastest growing market share for hand-held devices - everyone wants to have a smartphone (whether they actually use most of the features or apps for their smartphone is another matter). What is going to be the deciding factor amongst these smart phones for users is their ease of use, flexibility and apps (applications downloaded and installed on the phone to enhance their functionality and customization). Smart phone deployment and usage in the enterprise environment will be decided by such factors as security, email and messaging simplicity, document management, navigation and web conferencing. The smart phone is evolving and will continue to change how we view mobile communications and connectivity. In many parts of the world, people are dispensing with their landline (if they even had one) and only using a smartphone.

Social Networks and Networking - or the power of the Tweet. It is a serious mistake to underestimate the power of social networks (whether it be IMs, tweets or the "old school" email). Social networks have been used to help free people who have been incarcerated overseas, organize popular social and music events and even keep in touch with family and friends. Social networks have tremendous power and influence - far more than most people realize (and probably want to accept either). The "traditional" workplace is quickly changing - more people are working from home or from other locations and want and even need this contact. This does not mean the real-time interaction of the bricks-and-mortar work place environment have been lost - just changed. If you are curious - tweet a friend and ask.
People keep in contact through Facebook or other social sites, blurring the line between work and social boundaries. The use of Microsoft Office Communicator will allow users to have both business and personal contacts in one IM interface. Business and IT leaders will have to learn to use these as the in order to accelerate the business-decision process and maintain relevance with workers. Customers will expect immediate answers to questions and employees can accomplish more through these communications.

Touch Screen Computing - What comes to mind now when we think of touch-screen computing? The iPad, of course. There will be even more touch screen devices released this year as other manufacturers release products to compete with the iPad. In some cases, a gesture, not a touch or a mouse-click will control computers. New game consoles (Microsoft's Kinetic, where you are the controller) will be released this fall. They don't rely on the movement of a hand-held device, but gestures made towards the receiver. This type of technology will aid those with physical challenges as well as make for much smaller physical footprints required for computers.

Solid State Disks - The ubiquitous hard drive (and other storage devices for that matter) is undergoing radical changes these days. The capacity of hard drives is increasing, but the basic technology has not changed; you still have magnetic disks and motors. Solid state drives are reaching a capacity that makes them a viable option for most laptop users. The solid state drive is a large flash memory device that does not have any moving parts. This results in devices that use much less energy, run much cooler and faster, and are much lighter.

Friday, July 16, 2010

net neutrality

This is one of the better articles that explains net neutrality and it's issues
http://www.huffingtonpost.com/michael-rose/net-neutrality-versus-the_b_634467.html

Keep in mind... providers currently have the "means" and ability to throttle down some services (for instance, the classic comcast case where they throttled down a customer's use of a particular "app")...... When and if the FCC re-classifies telecom providers, net neutrality and enforcement of it becomes a possibility.

ALA has done an excellent job of keeping us all informed of progress on efforts, but it's still a little unclear to some as to what the subject matter is. Hopefully this article will clear up some of the gaps in understanding.

Thursday, June 10, 2010

AT&T Confirms iPad 3G Security Breach | Wireless Week

AT&T security breach leaks ipad owners email addresses. But... most everyone agrees, ipad, iphone, etc. are no more vulnerable to attack or breach than anything else. It made the national headlines regardless so I'm sharing....

Check out this article on Wireless Week: http://www.wirelessweek.com/News/2010/06/Devices-ATT-iPad-3G-Security-Breach-Computers/

Tuesday, June 1, 2010

FierceWireless story: tcs

tcs thought you would be interested to read this story from FierceWireless.
Sales of Apple's (NASDAQ:AAPL) iPad tablet topped 2 million less than 60 days after the device went on sale in U.S. retail stores. The iPad, which made its debut April 3, is now available in

Friday, April 23, 2010

Ipad as an e-book reader and much more

I've been reading many many books on the ipad in the last couple days. ibooks and Amamzon kindle books are a pleasure to read on the device. As with any backlighted device, there is some eye strain if read a lot or too long, but it is worth it. It is very easy to obtain a book, and use it right away. And it is very easy to navigate within the apple ibook application. Ipad as an ebook reader is simply amazing. I've used three ebook readers and this by far is my favorite.

Lastly, I see where ipads are being implemented in point of sale situations, medical labs and hospitals, and every school kid wants one of course.

In my opinion, this is to the pc what a pc was once to a typewriter (what?).... they'll just improve these devices and competition will make even better ones available, and we'll all end up with new revolutionary "computer" tools in the very near future. Envision this in every car, in every restaurant, in every doctor's office, and what you'll read your morning newspaper on.

Seriously, in my opinion, with newspapers and magazine subscriptions at a historical low... this is the media you'll soon get your daily newspaper on and monthly magazines on, etc! And your tv and movies too! Some are ALREADY available in record time.

This will be pervasive technology. It explodes the new era that already had begun... blended media

Thursday, April 22, 2010

Ipad is really nice!

The Apple Ipad was released earlier this month and after testing, it is found to be a very useful, although NOT a pc, tool!

I use it to surf the web, do light documents with Apple's proprietary document kit (Pages, Numbers, Keynote). These documents are compatible with MS Office.

The Ipad is feature rich and fun. It is NOT a pc. In other words, there is no removable media capability, i.e. no thumb drive port, no zip disk, no cd/dvd drive, and no "real" hard drive (it uses flash drive).

If you have or have had an ipod or itouch, or even iphone, you will know instantly how to use the Ipad. It does require you to "dock" to a pc / mac computer to initialize and register the device then again for any future file transfers (pictures, documents, videos, movies, etc. Apple calls this a synch.

Short report.... summed up, my family needed an additional "laptop" mainly for internet and quick documents. This fits the bill and is very FUN to use!! Better yet, the ibooks e-reader is fantastic and free! And you can download ibooks from their store or from Amamzon's kindle store. All the books are there on kindle, but magazine and newspapers not yet available for the ipad.

Tuesday, April 20, 2010

Trends - New Horizon Report for K-12's has relevance for libraries

http://www.convergemag.com/edtech/2010-Horizon-Report-for-K-12-Released.html

Wednesday, March 17, 2010

National Broadband Plan

http://www.broadband.gov/plan/goals-action-items.html

Gartner Report - predictions

According to Gartner estimates:
The total number of PCs in use will reach 1.62 billion units in 2012, all of which are capable of Internet access, even if some are not connected.
By 2012, the combined installed base of smartphones and browser-equipped enhanced phones will exceed 1.69 billion units. From 2012 onwards, this combined installed base will be greater than the installed base for PCs.
Nevertheless, most users in 2012 will use a PC as their primary Web access device and their phone as a secondary access device. However, as use of smartphones spreads globally, they will overtake the PC as the most common primary device for Web access sometime in 2015.

Thursday, February 18, 2010

tcs has forwarded a page to you from FierceBroadbandWireless

tcs thought you would like to see this page from the FierceBroadbandWireless web site.
Smart card company Sagem Orga and Telefonica plan to roll out a new SIM card that features integrated WiFi, allowing any GSM phone to act as a universal and interoperable HSPA/WiFi router and

Wednesday, October 28, 2009

Fraudulent E-Mails Claiming to Be From the FDIC

The Federal Deposit Insurance Corporation (FDIC) has become aware of e-mails appearing to be sent from the FDIC that are asking recipients to download and open a "personal FDIC insurance file" to check their deposit insurance coverage. These e-mails are fraudulent and were not sent by the FDIC. The FDIC is attempting to identify the source of the e-mails and disrupt the transmission.

Currently, the subject line of the fraudulent e-mails includes the wording "check your Bank Deposit Insurance Coverage." The e-mails state: "You have received this message because you are a holder of a FDIC-insured bank account. Recently FDIC has officially named the bank you have opened your account with as a failed bank, thus, taking control of its assets."

The e-mails ask recipients to "visit the official FDIC website" by clicking on a hyperlink provided, which appears to be related to the FDIC and directs recipients to a fraudulent Web site. The Web site includes hyperlinks that appear to open forms. However, it is believed that clicking on the hyperlinks will cause an unknown executable file to be downloaded. While the FDIC is working with the United States Computer Emergency Readiness Team (US-CERT) to determine the exact effects of the executable file, recipients should consider the intent of the software as a malicious attempt to collect personal or confidential information, some of which may be used to gain unauthorized access to online banking services or to conduct identity theft. Financial institutions and consumers should NOT access the Web site or download the executable files provided on the Web site.

Information about counterfeit items, cyber-fraud incidents and other fraudulent activity may be forwarded to the FDIC's Cyber-Fraud and Financial Crimes Section, 550 17th Street, N.W., Room F-3054, Washington, D.C. 20429, or transmitted electronically to alert@fdic.gov. Information related to federal deposit insurance or consumer issues should be submitted to the FDIC using an online form that can be accessed at http://www2.fdic.gov/starsmail/index.asp.

For your reference, FDIC Special Alerts may be accessed from the FDIC's website at www.fdic.gov/news/news/SpecialAlert/2009/index.html. To learn how to automatically receive FDIC Special Alerts through e-mail, please visit www.fdic.gov/about/subscriptions/index.html.

Sandra L. Thompson
Director
Division of Supervision and Consumer Protection

Tuesday, October 20, 2009

Gizmodo Recommendation: Acer AS1410 Notebook Is Netbook-Sized and Netbook-Priced

tcs has sent you a link to a post on Gizmodo:

Title: Acer AS1410 Notebook Is Netbook-Sized and Netbook-Priced
Link: http://gizmodo.com/5385426/acer-as1410-notebook-is-netbook+sized-and-netbook+priced

tcs says: acer netbook

Gizmodo Recommendation: Barnes & Noble's Dual-Screened Nook: $260, Eats the Kindle's Lunch

tcs has sent you a link to a post on Gizmodo:

Title: Barnes & Noble's Dual-Screened Nook: $260, Eats the Kindle's Lunch
Link: http://gizmodo.com/5385938/barnes--nobles-dual+screened-nook-260-eats-the-kindles-lunch

tcs says: Kindle or B&N Nook?

Monday, October 12, 2009

tcs has forwarded a page to you from FierceBroadbandWireless

tcs thought you would like to see this page from the FierceBroadbandWireless web site.

There is 802.16d and 802.16e, and in a year or two, we will have 802.16m. The IEEE is now working on a new wireless standard called 802.16m, and the group entrusted with developing it hopes it


Thursday, October 8, 2009

Massive Phishing Attack on going

Starting October 6, there has been a massive phishing attack targeting Gmail, Yahoo, AOL and other type "gmail" accounts.

The most recent list of compromised accounts, which includes login credentials for Gmail, Yahoo, AOL, Earthlink, and Comcast users, contains some accounts that appear to be old, unused, or fake. However, many others listed are, in fact, genuine.

The website where the accounts were posted - pastebin.com - is now "down for maintenance." Visitors to the site today will receive a message that reads:

Pastebin.com is getting an unprecedented amount of traffic due to a news story in which some leaked Hotmail passwords have been pasted on this site

Pastebin.com was intended as a tool to aid software developers, not for distributing this sort of material. Filters have been put in place to prevent reoccurrence, but the current traffic level is unsustainable.

Regardless of whether or not you think your account was compromised, today would be a good day to change the password on whichever webmail service you currently use. Better safe than sorry!

Also... as always, remember, don't fall for any email solicitations asking for your user id's and passwords, or any personal information!!! And, better yet, if you don't think the email looks legit; don't even open it.

As a side note... my credit card company contacted me this week and sent out new cards because they were compromised. Thousands of accounts were hacked. Good news is my credit card company is always on the ball and quick to freeze compromised accounts and issue new cards.... but be advised.... it's only going to get worse, so watch yourself and your electronic transactions!

Tuesday, September 22, 2009

bing vs other search engines

Every month since its launch<http://www.techcrunch.com/2009/05/31/go-bing-yourself-right-now/>, Microsoft's Bing search engine keeps taking a little bit of market share. In August, Bing gained 0.4 percent to end the month with 9.3 percent of search query volumes in the U.S., according to comScore's Qsearch estimates. Meanwhile, Google's share came down 0.1 percent to 64.6 percent and Yahoo/s remained flat at 19.3 percent.

U.S. Core Search Share, August 2009 (Source: comScore qSearch)
Google

64.6%

-0.1% m/m

+1.3% y.y

Yahoo

19.3%

0.0% m/m

-0.4% y/y

Microsoft

9.3%

+0.4% m/m

+0.9% y/y

AOL

3.0%

-0.01% m/m

-1.3% y/y

Ask

3.9%

0.03% m/m

-0.4% y/y

Monday, September 21, 2009

net neutrality rules

Of interest to all of us... - tcs

FCC to propose new net neutrality rules<http://lists.fiercemarkets.com/c.html?rtr=on&s=69l,18z71,238p,bdig,bg6l,ljqy,5l08>

By Sean Buckley

[cid:image001.gif@01CA3AB0.0D419F60]<http://lists.fiercemarkets.com/c.html?rtr=on&s=69l,18z71,238p,3tzx,hv0u,ljqy,5l08#comment>Comment<http://lists.fiercemarkets.com/c.html?rtr=on&s=69l,18z71,238p,3tzx,hv0u,ljqy,5l08#comment> | [cid:image002.jpg@01CA3AB0.0D419F60] <http://lists.fiercemarkets.com/c.html?rtr=on&s=69l,18z71,238p,7w3m,9kf5,ljqy,5l08> Forward<http://lists.fiercemarkets.com/c.html?rtr=on&s=69l,18z71,238p,7w3m,9kf5,ljqy,5l08>


Julius Genachowski is set to make one of his first big moves as FCC chairman today with the introduction of a new set of net neutrality rules that will give users the right to get free and equal access to any bandwidth-intensive service. Industry sources say the new FCC rules, which will in effect prevent telecom giants AT&T, Verizon and cable MSO Comcast from being able to throttle or slow down specific Web sites, will pass today.

The new FCC rules will include a mandate that service providers will have to disclose how they manage their network traffic, or what it is called a "sixth principle" to the four previous rules that were created in 2005 for Internet operations. Genachowski will also unveil a "fifth principle" that would prevent service providers from discriminating against applications and services that traverse telecom, cable and wireless-based Internet networks.

Not surprisingly, AT&T, Verizon and Comcast refused to comment on the proposed rules. Net neutrality has been a sticky issue between the FCC and Comcast. The MSO is appealing a previous FCC action barring it from rate limiting Internet user's bandwidth consumption on its network.

Some industry groups, however, believe the rules will actually hinder and not help consumers. "We believe that this kind of regulation is unnecessary in the competitive wireless space as it would prevent carriers from managing their networks -- such as curtailing viruses and other harmful content -- to the benefit of their consumers," said Chris Guttman-McCabe, vice president of regulatory affairs for CTIA, the wireless industry's trade group in an interview<http://lists.fiercemarkets.com/c.html?rtr=on&s=69l,18z71,238p,d5xy,1tw6,ljqy,5l08> with the Wall Street Journal.

If the rules are passed, customers of Google and other upstart application providers will be able to run their applications freely over any existing wireline or wireless broadband network or device. "Be they entrepreneurs or innovators or consumers or less powerful voices, a principle on transparency is about knowing how large carriers manage traffic on networks and understanding how their content will be treated ahead of time so no one is surprised," said a source at the agency in a Washington Post article<http://lists.fiercemarkets.com/c.html?rtr=on&s=69l,18z71,238p,ep3j,fg6s,ljqy,5l08>.

For more:
- Washington Post has this article<http://lists.fiercemarkets.com/c.html?rtr=on&s=69l,18z71,238p,ep3j,fg6s,ljqy,5l08>

Tuesday, September 15, 2009

802.11n finally official standard for wi-fi

1. Six years after first draft version, 802.11n finally official standard<http://lists.fiercemarkets.com/c.html?rtr=on&s=69l,18uid,8mf,2xof,cwof,4gf9,ikim>

By Lynnette Luna

[cid:image001.gif@01CA35E2.8E2F3560]<http://lists.fiercemarkets.com/c.html?rtr=on&s=69l,18uid,8mf,alnr,ebfs,4gf9,ikim#comment>Comment<http://lists.fiercemarkets.com/c.html?rtr=on&s=69l,18uid,8mf,alnr,ebfs,4gf9,ikim#comment> | [cid:image002.jpg@01CA35E2.8E2F3560] <http://lists.fiercemarkets.com/c.html?rtr=on&s=69l,18uid,8mf,9sq8,224w,4gf9,ikim> Forward<http://lists.fiercemarkets.com/c.html?rtr=on&s=69l,18uid,8mf,9sq8,224w,4gf9,ikim>


Are you pinching yourself? The IEEE has finally approved the 802.11n wireless LAN standard--three years after the Wi-Fi Alliance began certifying Draft N products and six after the first draft version of the standard and multiple draft versions.

The new wireless networking standard--designed to offer 300 mbps and higher in throughput speeds--will work with the existing W-Fi Certified Draft N wireless products. When the alliance began certifying Pre N products, it had the assurance that all of the hardware specifications wouldn't change and any updates would be software in nature. According to the Wi-Fi Alliance the majority of the existing draft standard equipment can be updated via firmware.

The move, however, raises the comfort level of enterprises that can now deploy standardized equipment. Other vendors are touting the new standard as a way for companies to raise the bar on outdoor WiFi networks, which in the past fell short of technical capabilities when it came to the promise of muni-WiFi.

WiMAX Forum launches global roaming program

WiMAX Forum launches global roaming program
January 21, 2009 - 7:59pm ET | By Lynnette Luna<http://www.fiercebroadbandwireless.com/author/lluna>
The WiMAX Forum has launched its Global Roaming Program designed to enable operators and vendors to obtain the information they need to establish WiMAX roaming services. The program includes documents such as technical specifications, a test plan, roaming contract templates and a guide to follow when enacting roaming.
John Dubois, global roaming director with the WiMAX Forum, told FierceBroadbandWireless that roaming will be a critical element for more ubiquitous coverage. "We'll see roaming be more domestic and regionally initially, and that will help operators such as those in Taiwan, where the licenses were given to cover only half of the country. They need roaming to create a continuous service across the country," he said.
The WiMAX Forum is also working with the CDMA Development Group to enable roaming between WiMAX and CDMA as Sprint and Clearwire desire to marry Sprint's 3G CDMA network with Clearwire's WiMAX systems.
In November, Airspan and U.K. operator Freedom4 demonstrated a seamless handoff between WiMAX networks that operate on different spectrum bands. The companies say the accomplishment is significant as users will be able to roam from one operating network to another, such as between a licensed Clearwire 2.5 GHz network and a license-free 3.65 GHz network. Operators will have the option to deploy a mobile WiMAX network using more than one frequency band.
For more:
- check out the WiMAX Forum's web site<http://www.wimaxroaming.org/>


Read more: http://www.fiercebroadbandwireless.com/story/embargoed-wimax-forum-launches-global-roaming-program/2009-01-21#ixzz0RBQoUqKb

Thursday, September 10, 2009

healthcare phishing and spams

Published: 2009-09-10,
Last Updated: 2009-09-10 02:30:55 UTC
by Johannes Ullrich (Version: 1)
0 comment(s) Facebookacebook witter

 

Shorty after President Obama finished his speech about healthcare earlier tonight, our reader Roy received an email advising him to sign up for a "Low Income Healthcare Enrollment". If you see something similar, let us know. The possibilities for phishing, malware and other scams are endless with current events like this.

As usual, you will not receive an e-mail from a government agency asking you to divulge your private information on a random website.

------
Johannes B. Ullrich, Ph.D.
SANS Technology Institute
Twitter

 

Friday, September 4, 2009

apache.org offline due to ssh compromise

Apache.org compromised.

New Scams and Phishing

There is a Vonage scam out to get you to enter your account information.
There are two new active bank phishings going on, so beware of emails asking you to log in to a site and enter your bank issued credit card info to "keep it from expiring". Bank of America and Wachovia.

tcs

Thursday, September 3, 2009

Revised Legislation Still Gives President Power to Shut Down Portions of the Internet

Proposed legislation introduced in April gave the President the power to "declare a cybersecurity emergency and order the limitation or shutdown of internet traffic to and from a compromised federal government or critical infrastructure information system or network.......

http://www.sans.org/newsletters/newsbites/newsbites.php?vol=11&issue=69&rss=Y#sID200

--
This article was sent using my Viigo.
For a free download, go to http://getviigo.com


Sent for tcstover from Verizon Wireless BlackBerry

Tuesday, September 1, 2009

stimulus package round one stats

http://www.ntia.doc.gov/press/2009/BTOP_BIP_090827.html

Wednesday, August 26, 2009

DHS Warns of Malicious Spoofed eMail (August 24, 2009)

The US Department of Homeland Security (DHS) has warned of malicious email messages that appear to be from the DHS Division of Intelligence.......

http://www.sans.org/newsletters/newsbites/newsbites.php?vol=11&issue=67&rss=Y#sID306

--
This article was sent using my Viigo.
For a free download, go to http://getviigo.com


Sent via BlackBerry by AT&T for Treasure Stover

Microsoft Suspends Hotmail Attach-Photo Feature (August 21, 2009)

Microsoft has temporarily suspended the Attach-Photo feature in Hotmail because of security issues.......

http://www.sans.org/newsletters/newsbites/newsbites.php?vol=11&issue=67&rss=Y#sID311

--
This article was sent using my Viigo.
For a free download, go to http://getviigo.com


Sent via BlackBerry by AT&T for Treasure Stover

Friday, August 21, 2009

Various Email scams abound....

Of late, we've heard of various email phishing scams, all looking as if they come from a legitimate source. They are scams and usually require you to click on some link or open an attachment. No bank or credit card company would ever have you confirm information via an email.

Current phishing type scams: Bank of America, Chase, Paypal

Thursday, July 23, 2009

FierceWireless story: tcs

tcs thought you would be interested to read this story from FierceWireless.
The iPhone 3GS was a record-setting winner for AT&T Mobility. The company, which reported its second-quarter earnings today, said it activated 2.4 million iPhones and added 3.5 million integrated

Tuesday, July 21, 2009

think data / computer security is too serious?

Last November, with what the FBI calls a "coordinated attack" on ATM machines in major cities, a criminal organization used 100 fake payroll and gift cards to steal $9 million in 30 minutes. The FBI issues a plea for help identifying video surveillance images.

In 2007 a weapons project was breached.
In 2008 the FAA website was hacked and took over servers in Alaska.
The CIA has revealed hackers have caused power outages outside the USA.


Many "doomsayers" fear an ultimate attack by terrorists on US financial systems.

Ultimately, security is a serious business and we should all take it very seriously and keep our wits about us.

Here are five practical defenses in the "cyber" world: And keep your antivirus up to date and running!!!!!


1. Know your network.

2. Test and verify.

3. Seize control allowing only necessary ports to be open.

4. Be suspicious.

5. Watch your back.

Updated info on Stimulus package

Libraries are encouraged to check into the stimulus package as it pertains to
1. Public Computing Centers
2. Sustainable Broadband Adoption

Out of an NTIA and RUS workshop last week:

There'll be $4.7 Billion over three rounds / cycles of offerings.
THere is no advantage or disadvantage to applying in the first round / cycle.
Underserved and unserved do not apply to these two categores of offerings.
Some construction and some administration costs can be included in the proposal.

First round cycle apps are due Aug 14, and will be awarded in November.
Second round cycle apps are due in late 2009 (not yet released) and awarded in early 2010.
THird round cycle apps later in 2010 awarded 2010.

NTIA and RUS consider to be "very favorable approaches:
Digital learning and training
Loaning of equipment
Outreach to community
Partnerships with community involvement / support

For more info, please go to ALA site, NTIA site, and/or RUS site.

About Us

Blogroll