{"id":3140,"date":"2001-07-19T14:59:11","date_gmt":"2001-07-19T19:59:11","guid":{"rendered":"http:\/\/smperformance.wordpress.com\/?p=3140"},"modified":"2001-07-19T14:59:11","modified_gmt":"2001-07-19T19:59:11","slug":"stratvantage-consulting-llc-mikes-take-on-the-news-071901","status":"publish","type":"post","link":"https:\/\/stratvantage.com\/index.php\/2001\/07\/19\/stratvantage-consulting-llc-mikes-take-on-the-news-071901\/","title":{"rendered":"StratVantage Consulting, LLC &#8212; Mike&#8217;s Take on the News 07\/19\/01"},"content":{"rendered":"<table cellspacing=\"0\" cellpadding=\"0\" width=\"100%\">\n<tr>\n<td>\n<h3><a href=\"http:\/\/evernote.com\/\">From Evernote:<\/a><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h1>StratVantage Consulting, LLC &#8212; Mike&#8217;s Take on the News 07\/19\/01<\/h1>\n<p> Clipped from: <a href=\"http:\/\/www.stratvantage.com\/news\/071901.htm\">http:\/\/www.stratvantage.com\/news\/071901.htm<\/a><\/td>\n<\/tr>\n<\/table>\n<h1><strong>T<\/strong>he News \u2013 07\/19\/01<\/h1>\n<p><strong><em>P2P Use May Be Even More Illegal Than You Thought<\/em><\/strong><\/p>\n<p>It\u2019s fairly well recognized in the post-Napster world that using peer-to-peer technology can get you in trouble<strong>.<\/strong> Legal woes for Napster and its users, however, centered more around the copyright infringement issue, and not on the technology<strong>.<\/strong> Well, <a href=\"http:\/\/www.mcowen.com\/\">David McOwen <\/a>, a now-former employee of DeKalb Tech, part of the Georgia state university system, may soon be arrested and face a maximum penalty of 15 years in prison \u2013 for installing a screensaver from Distributed.net on some of the computers at DeKalb<strong>.<\/strong><\/p>\n<p>So what could possibly be worthy of hard time in this case<strong>?<\/strong> Well, at first you might think of the stolen CPU cycles<strong>.<\/strong> Distributed.net farms out large computing projects to many participating computers, who work on them when they\u2019re doing nothing else<strong>.<\/strong> Although idle Georgia state resources were used, it\u2019s hard to see the foul there<strong>.<\/strong> The computers weren\u2019t doing anything anyway<strong>.<\/strong><\/p>\n<p>It turns out the state wants to nick McOwen for using bandwidth, a very expensive amount of bandwidth<strong>.<\/strong> It claims that the Distributed.net client cost the state $415,951<strong>.<\/strong>49 in bandwidth charges, which it calculates at 59 cents per second or $1,529,280 per month<strong>.<\/strong> I want to be that college\u2019s broadband provider<strong>!<\/strong> Especially considering you can get a full T-1 for under $900 a month in DeKalb county<strong>.<\/strong> So at that price, the state is claiming McOwen stole roughly 61 terabit-seconds of bandwidth, most of it in December when few students were in school<strong>.<\/strong> Clearly, the damages must be based on something other than bandwidth<strong>.<\/strong><\/p>\n<p>Leaving aside the preposterousness of the monetary charges, it\u2019s clear that McOwen did make non-business use of state resources, along with probably hundreds if not thousands of other state employees<strong>.<\/strong> I can\u2019t decide if Georgia is just that clueless, or if it merely wants to set an example by crushing this poor defenseless system administrator<strong>.<\/strong> Taking a look at the math, though, makes me lean toward cluelessness<strong>.<\/strong><\/p>\n<p>If you\u2019re concerned about this travesty of justice, you might want to give David a hand<strong>.<\/strong> You can contact his attorney, David Joyner, of law firm <a href=\"http:\/\/kenneyandsolomon.com\/\">Kenney and Solomon <\/a> in Duluth Georgia, at <a href=\"https:\/\/mail.google.com\/mail\/?view=cm&amp;fs=1&amp;tf=1&amp;to=cdjoyner66@aol.com\">cdjoyner66@aol.com <\/a> or 770-564-1600<strong>.<\/strong><\/p>\n<p>Regardless of how you feel about McOwen\u2019s plight, this story underscores a key issue that businesses will have to deal with regarding P2P computing<strong>.<\/strong> While it may be ludicrous to think that McOwen\u2019s use of public property caused $415,000 in damages, it is entirely possible that employee use of P2P technology could damage a business<strong>.<\/strong><\/p>\n<p>Most applications in the hive computing or distributed computing class, like Distributed.net and the more famous SETI@Home, are fairly benign<strong>.<\/strong> They accept small chunks of data from a server on the Internet, and run as screen savers to process the data<strong>.<\/strong> The result is sent back to the server, and it generally is also not a large amount of data<strong>.<\/strong> It\u2019s possible that employees will leave their computers on more when running one of these applications, and it\u2019s even possible that they will get paid for using business resources<strong>.<\/strong> But outside of a little electricity and wear and tear on equipment, along with a little bit of extra bandwidth usage, there\u2019s not usually a lot of direct damage to the enterprise<strong>.<\/strong><\/p>\n<p>File sharing P2P applications, however, are a different matter<strong>.<\/strong> Although there is a security risk in running even hive computing applications within the enterprise, the risk is magnified when employees run consumer-grade file sharing applications<strong>.<\/strong> Although Napster may be becoming a non-factor, there are many other services like <a href=\"http:\/\/www.musiccity.com\/en\/frameset_web_fl_teal.html\">Morpheus <\/a> or <a href=\"http:\/\/www.kazaa.com\/\">KazAa <\/a> springing up to facilitate music file sharing<strong>.<\/strong> Then there are other services such as <a href=\"http:\/\/www.bearshare.com\/\">Gnutella <\/a> and <a href=\"http:\/\/www.unwrapper.com\/\">Wrapster <\/a> that let users share any kind of file, even sensitive company information<strong>.<\/strong> For more information on P2P applications, see the white paper, <em><a href=\"http:\/\/www.geneer.com\/publications\/download.asp?filename=hives\">The Buzz About Hive Computing: Putting Peer-to-Peer Computing to Work <\/a>,<\/em> or the <a href=\"http:\/\/www.stratvantage.com\/directories\/p2pcos.htm\">P2P for Business Directory <\/a><strong>.<\/strong><\/p>\n<p>Many enterprises solve these problems by identifying the ports and protocols the offending services use, and then blocking them<strong>.<\/strong> The problem is in keeping up with the myriad services, and knowing where to stop<strong>.<\/strong> For example, your employees may be using Instant Messaging (IM) clients such as AOL Instant Messenger, or similar programs from Yahoo and Microsoft<strong>.<\/strong> They may even be using these IM services to communicate with customers and suppliers<strong>.<\/strong> Plus, these clients can also allow users to share files<strong>.<\/strong><\/p>\n<p>Clearly the P2P phenomenon can mean a loss of control, at the enterprise level, over what happens on your network<strong>.<\/strong> Although there are many P2P companies such as <a href=\"http:\/\/www.groove.net\/\">Groove Networks <\/a>, <a href=\"http:\/\/www.mercuryprime.com\/\">Mercury Prime <\/a>, and <a href=\"http:\/\/www.1stworks.com\/\">1stWorks <\/a> developing secure IM and other secure collaboration technologies, adopting these solutions doesn\u2019t address the problem of what to do with rogue Internet applications on your network<strong>.<\/strong><\/p>\n<p>At the very least, businesses should formulate acceptable Internet use policies and require employees to sign and abide by them<strong>.<\/strong> But make sure these policies have a heart. If you ban all personal use of the Internet, you\u2019ll make scofflaws out of every employee who wants to check the weekend weather or occasionally visit a recreational site<strong>.<\/strong><\/p>\n<p>There\u2019s no denying that non-work use of computers is a problem<strong>.<\/strong> According to the 2001 Web@Work <a href=\"http:\/\/www.websense.com\/company\/news\/research\/webatwork-employer2001.pdf\">study <\/a> sponsored by Internet filtering vendor <a href=\"http:\/\/www.websense.com\/\">Websense <\/a>:<\/p>\n<ul>\n<li>20 percent of work computers have Napster on them<strong>.<\/strong><\/li>\n<li>45 percent of people send more personal email from work than from home<strong>.<\/strong><\/li>\n<li>63 percent of employers reported that their employees access non-work-related Internet sites at work, and 27 percent have experienced an increase in inappropriate employee Internet use this year<strong>.<\/strong><\/li>\n<li>34 percent of companies have reprimanded or disciplined employees for inappropriate Internet use this year<strong>.<\/strong><\/li>\n<li>Of companies that have reprimanded or disciplined employees, more than one out of every three terminated those employees for inappropriate Internet use<strong>.<\/strong><\/li>\n<li>3.3 percent of companies overall have been involved in litigation from inappropriate Internet use<strong>.<\/strong><\/li>\n<\/ul>\n<p>Going hand-in-hand with usage policies is a comprehensive network security policy and an educational effort to ensure your employees understand the threat and the importance of adherence<strong>.<\/strong><\/p>\n<p>The P2P genie is out of the bottle<strong>.<\/strong> You may be able to stop employees from downloading Napster files, but chances are good there\u2019s another bandwidth-sucking, security-administrator-bedeviling application around the corner<strong>.<\/strong> Good policies and good education will be more effective in securing and protecting your resources than prosecuting unwitting miscreants like David McOwen<strong>.<\/strong><\/p>\n<p><a href=\"http:\/\/www.openp2p.com\/pub\/a\/p2p\/2001\/07\/10\/mcowen.html\">OpenP2P <\/a><\/p>\n<p><strong><em>Briefly Noted<\/em><\/strong><\/p>\n<ul>\n<li><strong>Shameless Self-Promotion Department<\/strong>: We\u2019ve recently re-ranked the trends in the TrendSpot, adding a new trend: the Post-PC World<strong>.<\/strong><br \/>\n<a href=\"http:\/\/www.stratvantage.com\/trendspot\/index.html\">The TrendSpot <\/a><\/li>\n<li><strong>Prepare to Get Toasted: <\/strong>Alert SNS Reader Larry Kuhn, recently employed by our favorite software <a href=\"http:\/\/smperformance.files.wordpress.com\/2013\/08\/718d2bf680767a264f3ce056cffd856d.jpeg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/smperformance.files.wordpress.com\/2013\/08\/718d2bf680767a264f3ce056cffd856d.jpeg\" alt=\"\" width=\"197\" height=\"160\" class=\"alignnone size-full wp-image-3141\" \/><\/a>\n<p>monopoly, sends along this new bit of jargon about Windows XP<strong>.<\/strong> Seems that when you get an email on Microsoft\u2019s next OS, a little window gradually pops up, much like a piece of toast<strong>.<\/strong> Within the software giant, people refer to this as Toast, as in \u201cYou\u2019ve got Toast<strong>!<\/strong>\u201d (Wait, that\u2019s another soon-to-be-monopoly I\u2019m thinking of<strong>.<\/strong>)<\/li>\n<li><strong>Speaking of How Not to Run An Online Grocery:<\/strong> I swear I didn\u2019t see the Keenan Vision analyst report, <em>Grow Big Fast Fails for Webvan and Amazon<\/em>, before writing the <a href=\"http:\/\/www.stratvantage.com\/news\/071601.htm\">previous SNS <\/a><strong>.<\/strong> How could I? It was released July 18th, two days after my article<strong>.<\/strong> Hmmm. Coincidence<strong>?<\/strong> Anyway, here\u2019s a quote from the report, which Keenan <em>claims<\/em> was inspired by the Webvan closing<strong>.<\/strong> (Alert SNS Readers may suspect otherwise <strong>.<\/strong> . .) \u201cWebvan was fatally infected with a metaphorical disease that Keenan Vision calls the Grow Big Fast Syndrome<strong>.<\/strong> Also known as First Mover Advantage, GBF syndrome is a deadly disease that has killed off dozens of dot-com startups<strong>.<\/strong> GBF is a powerful affliction&#8211;it destroys ideas no matter whether they are smart or dumb<strong>.<\/strong>\u201d When I was a dotcommie it seemed all we could talk about was the First Mover Advantage<strong>.<\/strong> How the mighty have fallen.<br \/>\n<a href=\"http:\/\/www.keenanvision.com\/doc\/gbf\/gbf.asp\">Keenan Vision <\/a><\/li>\n<li><strong> Nokia and Motorola in Turkish bath<strong>?<\/strong><\/strong> Turkey&#8217;s Uzan family controls Telsim, the country&#8217;s second largest mobile operator<strong>.<\/strong> The company has failed to meet about $1 billion in debt repayments due to Motorola and Nokia and now the companies have hired a US private investigation firm to look into the assets and wealth of the family<strong>.<\/strong> In a common practice in high tech these days, the handset makers had provided Telsim with vendor financing secured by Telsim shares<strong>.<\/strong> Telsim, however, has apparently issued more shares, diluting the companies&#8217; interest (Motorola&#8217;s interest was diluted from 66 percent to 22 percent<strong>!<\/strong>). Just as Cisco got tripped by vendor financing when the dotcom bubble burst, so now have Motorola and Nokia learned an expensive lesson about driving volume through deferred payments<strong>.<\/strong><br \/>\n<a href=\"http:\/\/www.ewirelessnews.com\/\">eWireless News <\/a> (requires registration)<\/li>\n<\/ul>\n<p>Get an update on the stories in this issue<strong>.<\/strong> Visit the <a href=\"http:\/\/www.stratvantage.com\/news\/071902.htm\">Wayback Machine <\/a>.<\/p>\n<h2>Can\u2019t Get Enough of ME<strong>?<\/strong><\/h2>\n<p>In the unlikely event that you want more of my opinions, I\u2019ve started a Weblog<strong>.<\/strong> It\u2019s the fashionable thing for pundits to do, and I\u2019m doing it too<strong>.<\/strong> A Weblog is a datestamped collection of somewhat random thoughts and ideas assembled on a Web page<strong>.<\/strong> If you\u2019d like to subject the world to your thoughts, as I do, you can create your own Weblog<strong>.<\/strong> You need to have a Web site that allows you FTP access, and the free software from <a href=\"http:\/\/www.blogger.com\/\">www.blogger.com <\/a><strong>.<\/strong> This allows you to right click on a Web page and append your pithy thoughts to your Weblog<strong>.<\/strong><\/p>\n<p>I\u2019ve dubbed my Weblog entries \u201cStratlets\u201d, and they are available at <a href=\"http:\/\/www.stratvantage.com\/stratlets\/\">www.stratvantage.com\/stratlets\/ <\/a><strong>.<\/strong> Let me know what you think. Also check out the <a href=\"http:\/\/www.stratvantage.com\/trendspot\/\">TrendSpot <\/a> for ranking of the latest emerging trends<strong>.<\/strong><\/p>\n<p><a href=\"http:\/\/www.stratvantage.com\/news\/mikestake.htm\">Return <\/a> to Mike\u2019s Take<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From Evernote: StratVantage Consulting, LLC &#8212; Mike&#8217;s Take on the News 07\/19\/01 Clipped from: http:\/\/www.stratvantage.com\/news\/071901.htm The News \u2013 07\/19\/01 P2P Use May Be Even More Illegal Than You Thought It\u2019s fairly well recognized in the post-Napster world that using peer-to-peer technology can get you in trouble. Legal woes for Napster and its users, however, centered &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/stratvantage.com\/index.php\/2001\/07\/19\/stratvantage-consulting-llc-mikes-take-on-the-news-071901\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;StratVantage Consulting, LLC &#8212; Mike&#8217;s Take on the News 07\/19\/01&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,1],"tags":[],"class_list":["post-3140","post","type-post","status-publish","format-standard","hentry","category-sns","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/posts\/3140","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/comments?post=3140"}],"version-history":[{"count":0,"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/posts\/3140\/revisions"}],"wp:attachment":[{"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/media?parent=3140"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/categories?post=3140"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/tags?post=3140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}