Wednesday 13 July 2016

The (Re)Rise of Assembly

Well, I never.

In days long ago when I first started out in IT, the language of choice for any serious developer had to be Assembly, whether it be Z80, 6510 or 6502. In-machine memory was small and expensive and developers needed to produce code that was tight, efficient and compact. Things progressed, memory became cheap and newer, ’easier’ programming languages took hold.

Now, with the emergence of the Internet of Things (IoT) the demand for Assembly language skills seem, to be once more, on the rise. According to Tiobe's programming language index, Assembly just cracked the top-10.


It is no surprise that the languages most in demand are still C, C++ and Java, but this blogger, for one, never imagined a time when Assembly would once more appear in the top 10. 

The most likely reasons that we are seeing this trend is the growth in small devices that, by nature of their size, have a need for the compact coding footprint of that once popular form of programming. Plus, Assembly code for a set chip-set can run on just about any device that makes use of that chip-set.

As IoT technology evolves we may see a reversal in the ‘rise from the ashes’ of Assembly, new technology may once more allow the use of looser, bigger foot print languages. But for now, as a developer, you could do a lot worse than dusting of your old Assembly skills.

Related Posts



Will Hogarth
CTO @ VGS Media

Will Hogarth is a long time geek, writer and long distance triathlete, with extensive experience in most areas of the IT World. Will is a former games developer, DBA and project manager, but unlike most geeks he has a passion for the outdoors and a life of adventure.

Links

Monday 11 July 2016

Throwing Business Away

In our technological age, data is king. We all look to grow the quantity and quality of the data we hold on our respective CRM systems. 

The way we can collect this data can vary: mailing lists, logins for free downloads or subscription benefits. Whichever way you collect your data, one thing that is almost certain is that you/your business will be making use of on line forms.

This brings me to my point. There are so many companies, including some of the larger organisation, throwing away this opportunity.

How?

The problem is they use an email validation routine within their forms that only copes with the tradition Top Level Domains (TLDs). This means it is OK if your perspective customer trying to give you their data, uses a ‘.com’ or a ‘.co.uk’ email address. However, if they use one of the newer TLDs,  (such as '.global') their email address will be rejected as being invalid. 


The Result

They will then soon become fed up and go to one of your competitors. All this means you have lost out on valuable data, and moreover: the prospect of a new customer.

In Wrap Up

In order to make sure you and/or your organisation does not lose out, the answer is simple: Make sure any data capture forms validate any email addresses against the latest list of Top Level Domains.

Talk to VGS Media about your Web App needs

Will Hogarth
CTO @ VGS Media

Will Hogarth is a long time geek, writer and long distance triathlete, with extensive experience in most areas of the IT World. Will is a former games developer, DBA and project manager, but unlike most geeks he has a passion for the outdoors and a life of adventure.

Links

Wednesday 6 July 2016

Home AND Away

In the year ending December 2015, government figures show there were over 713,000 domestic burglaries in England and Wales. Averaged out, that is one burglary ever 45-seconds. This figure can be further split down to 499,000 burglaries in a dwelling and the remaining 214,000 in a non-dwelling.  (Non-dwellings include the likes of sheds and other out buildings.)

While this is a drop of almost 10% on the previous year, steps can be taken, to reduce your risk of being part of these statistics.  

The recent advancement on Smart Home security technology has taken residential security to a whole new level.

From basic motion sensors and sensors that detect open windows and doors, through to remote monitoring CCTV solutions, through again to the latest in smart, motion detection CCTV solutions.
  
It is now possible to set up a CCTV system that has specific zones for motion its detection. Then only if movement is detected, in the specified zone, will the alarm be raised. This allows users to set up the system so nearby tree movements etc. can be ‘zoned-out’ so to reduce the number of false alarms.


However, in the modern Smart Home, you do not have to stop there. Think about it. A CCTV motion sensor could trigger a chain of other events. A bedroom light could come on. Followed by a landing light. Then an audible alarm could be sounded if further sensors are triggered and messages sent to anyone on a predefined contacts list. All-in-all, making the home owner a less attractive target.

But what if I am away?

This is where the latest range of Smart Home equipment come into their own.

At one time consumers were limited to an alarm and a set of simple timers to switch lights on and off and pre-set times. Now, smart homes can be set up to ‘learn’ the habits of its occupants. What is learned can be stored and used as a pre-defined program to run when the home owner is away. This program can also be randomised to some level to give the prospective burglar more to think about.

So, lights can be set to come, dim, brighten and go off. TV and audio equipment may be programmed to play in different rooms. Blinds may be opened and closed, and even the vacuum cleaner can be set to do the rounds. All the time, the Smart Home owner can monitor their home from any internet connected location anywhere in the world.

At the end of the day it will seem to the casual onlooker that the home is occupied and busy. Again making it less likely to be just another statistic.

Is your home a Smart home?

Related Posts

Securing the Smart Home

Will Hogarth

CTO @ VGS Media

Will Hogarth is a long time geek, writer, and long distance triathlete, with extensive experience in most areas of the IT World. Will is a former games developer, DBA and project manager, but unlike most geeks he has a passion for the outdoors and a life of adventure.

Links

Monday 4 July 2016

Stand and Deliver

A switch back to security issues with today’s post. Specifically, a look at Ransomware, what it is and how to protect against it.

What is Ransomware?

Ransomware is a type of malware (or virus) that can be installed on a computer without knowledge or the intention of the user. Typically, it takes the form of a Trojan, entering a system through, a downloaded file or a vulnerability in an online service. Its aim is to restricts access to the infected computer system in some way, sometimes completely. Then it will demand that the user pays a fee (a Ransom) to the perpetrators to have the restriction removed.


Have Ransomware attacks not ended?

Things did seem to quiet down, however there has been a measured increase in detection of new threats. Kaspersky Lab Detected a 14% Increase in New Ransomware Modifications in the first quarter of 2016.

Are only PCs at risk?

Originally, this was the case. However, it did not take long for attacks to migrate from traditional targets to mobile devices. These infections work in much the same way, locking out a user until a fee is paid.

What can I do to protect myself?

Vigilance is the key. Avoid sites where pirated content is provided. Pirated downloads may have been modified to harbour hidden viruses and malicious content.  Avoid sites that stream pay for view content for free. Again for the same reasons as above. And also in this vain, think before clicking on a link.

Next, ensure you keep your anti-virus software up to date. At one time there was little defence against Ransomware, but now most credible anti-virus systems deal well with legacy attacks. I say legacy attacks as new malware is always been developed and there is always the risk of attacks before fixes become available. 

Finally, take regular off line back-ups.  Ransomware plays on a weakness that we are all afraid of losing all our precious content. Knowing that many of us would rather pay than suffer that fate. Having a good back-up policy removes this risk. If you become infected you can simply ‘flatten’ a machine and restore from back-up. 


Related Posts



Will Hogarth

CTO @ VGS Media

Will Hogarth is a long time geek, writer, and long distance triathlete, with extensive experience in most areas of the IT World. Will is a former games developer, DBA and project manager, but unlike most geeks he has a passion for the outdoors and a life of adventure.

Links


Wednesday 29 June 2016

Layers of the Smart Home

The question I get asked most about Smart Homes is: “Can you quickly explain how it all works?” So today’s post is based on how I normally explain Smart Home technologies to those people.

I Hope it helps.

To understand the technology of the Smart Home, you need to think of it like any other technology stack. It is arranged in layers. For the Smart Home, this can be considered as a 3-layer set…

1) The Interface Layer.

This is where you as the smart home owner/user control, monitor and programmes the full range of Smart Home technologies within the Home. This interface layer may take on the form of a wall mounted touch panel. Or, as is becoming more common, a PC, tablet or smart phone, via an app or range of apps. 
The interface layer also allows, those with the relevant skill set, the ability to write macros and programme their smart technologies to enhance their functionality.

2) The Controller Layer.

In any Smart Home, the controller is the hub of operations. It is the consolidated solution for unifying any connected ‘Things’ and controlling them from a one simple application. Many of the larger Smart Home suppliers provide a Controller of some sort.
The easiest way of thinking about it is, as a small, highly connected computer that specialises in providing access to, and controlling things. In fact, in some instances where a dedicated Smart Homes Controllers are not used, a PC can be slotted into his layer.

3) The Things Layer.

Things, as in the Internet of Things (or IoT), are the fun side of the technology set. In traditional IT terms they are the peripherals. The amount and range of which, are increasing every day. Things include: Lighting, Security, heating, comfort control, white-goods, etc. etc. The list goes on and on. 
The level of integration each of these ‘Things’ brings to the smart home is device dependant. These could range from being pre-programmed, to controlled remotely, through to being set up as truly smart and being allowed to control themselves based on a set of pre-defined logic.


In a nutshell there you have it. A basic look at how Smart Home technology all hangs together.



Will Hogarth

CTO @ VGS Media








Thursday 16 June 2016

Bluetooth 5 and the IoT

As I write this blog, Bluetooth SIG are getting close to announcing Bluetooth 5, the latest standard for the omnipresent, short range, wireless technology. The first major upgrade since 2011. (although there have been iterative updates since.)


The last of those iterative updates in December 2014 was Bluetooth 4.2 which added a few features to allow it to work better with the up and coming technology: called Internet of Things (IoT). This time round though, the IoT is much more in the public’s eye and you can be sure Bluetooth 5 will place the relevant functionality front and centre.

So what can we expect from an IoT front?


1) Range

The new Bluetooth 5, will reach up to 4-times the current distance of Bluetooth 4.2. This means it will move beyond being a personal area, short range peripheral network, to a longer range, local area, low-bandwidth network. This puts it in more direct competition with existing IoT standards, such as Z-Wave and Zigbee, both of which are long-range low power network standards.

2) Speed

Bluetooth 5 will be twice as fast as Bluetooth 4.2. Not a massive impact, since long-range low power networks are normally positioned around smaller bandwidth traffic, yet the speed increase should not be dismissed as being inconsequential.

3) Location Services and Expanded broadcast messaging

Bluetooth 5 won't just be about having a longer-range and being faster than before, it will also help facilitate additional location-based functionality. In particular, it should boost the uptake of beacon technology, which will result in significantly improved indoors navigation. This is due to Bluetooth 5 having significantly more capacity to facilitate advertising transmission. This means that it will be able to convey much more information to other compatible devices without forming a connection. Bluetooth already does this in a limited way, in order to notify you about the name and nature of other open Bluetooth networks, but Bluetooth 5 will be able to do much more.


One disappointment is that Bluetooth SIG have made it clear that its new Bluetooth mesh initiative is separate from the new Bluetooth 5 standard.  However, they did indicate that mesh for Bluetooth is on its way. Maybe, within the year.

Another thing to bear in mind is your older devices may not be fully compatible with the new standard. Devices should still work, but they will not be able to make use of any of the new features. 
So what does this all mean for the IoT?

Bluetooth 5 is a huge step in the right direction, and the hope is that with Bluetooth Mesh, this could be a significant player in the up and coming IoT and Smart Home technologies. And, when it comes down to it, consumers are much more used to wireless technologies such as Wi-Fi and Bluetooth than they are of Z-Wave and Zigbee.

So Bluetooth 5 … watch this space




Will Hogarth
CTO @ VGS Global

Wednesday 1 June 2016

Why do You Need a Strong Brand?

In short, Brand is everything. 


It is more than just a snazzy logo and a catchy strap-line. Good branding provides an organisation with an Identity.  A successful Brand can be seen as being a double edged sword. It should provide customers with an instantly recognisable and trusted front, but it should also provide staff with a framework within to operate.

Considering this statement, let us return to our opening question. “Why do You Need a Strong Brand?”

Recognition

Potential customers do business with companies they are familiar with. With Brands they know. If Branding is consistent and easy to recognize, it can help potential customers feel more at ease purchasing from an organisation. Organisations need to stand out from their competitors, and getting Branding right will help an organisation begin taking that crucial step forward, in any competitor line-up.  

Trust

There is a saying that states “Familiarity breeds trust.” And this is something that builds upon recognition. When customers are provided with a good experience, it is not just the service or product in question that benefits with an increase in reputation.  There is an added bonus is in the growth in trust for the overall Brand. For this free ride though, there must be a Brand in place to be trusted.

Representation

Brand also works within an organisation. It provides guidance on how members of a company conduct themselves. How they represent the company, how they dress, and how they use various lines of communication are all wrapped up in the organisational brand. Companies who get this right, deliver consistency to all who they deal with, building Recognition and developing Trust.

Sales

Ultimately, the purpose of a Brand is to increase sales. People love to tell others about the Brands they like. People are obsessed by Brands, and they’re constantly telling others about the Brands they love.  They can’t tell someone about a Brand they can’t remember. A strong Brand is critical if you want to increase sales via recommendations and referrals.

The most successful companies, no matter their size, have one important thing in common. They have established a strong Brand to build upon. It is something every member of the team can represent and every customer will recognise. A successful Brand is the foundation of a successful company. 

If you feel your company would benefit from Brand Review, no matter: if you are starting out or thinking of a re-branding exercise, feel free to get in touch with VGS Media.



Will Hogarth
CTO @ VGS Global




Monday 23 May 2016

What is this IoT I have been hearing about?

The IoT or internet of things is becoming an increasingly popular topic of conversation between technology experts and futurologists, but what is it?

The IoT is the network of connected physical objects. This includes everything from mobile phones, fridges, washing machines, webcams, lighting, wearable devices and almost anything else you can think of. There is a conservative estimate that there will be over 26 billion connected devices by the year 2020.


Examples often touted are of the coffee maker that texts you when you are running out of your favourite coffee or the smart fridge that tells you off for drinking too much beer. However, the are many more practical, real world, implementations of the IoT. Many heating providers are now advertising the smart heating systems that you can control remotely from your smart phone. Or, lighting companies who can provide lighting that can be pre-programmed to represent relevant moods. 

But why all the fuss?

Well on the bottom line is the energy saving possibilities that can be delivered by such technologies. It has been estimated that households could save up to 10% of the annual energy bills by the appropriate use of the IoT in a structured Smart Home scenario. Not to be sniffed at, by anyone.


But, Are we there yet?

This is a yes and no answer.  While some of the ideas and even some of the implementations of IoT devises are a bit ‘pie in the sky’ at the moment, more and more devices are coming onto the market every day.  The big plus is the Smart Home realisation of the IoT is most definitely with us. This includes centralised, remote and automated control of lighting, security, comfort and audio-visual aspect of the home.

So what does this mean?

Way back, along came the TV. Initially, to a few houses here and there. Then everyone had to have one (or more) Jump forward a few decades and a long came satellite TV. Again a few households here and there. Then almost everyone had a dish on the wall. The same can be said for mobile phones.

Smart Homes and the IoT will be the next such technology. All you need to do is Google the related subjects to see the march towards a truly connect world.

If you are interested in the Smart Home, feel free to get in contact with VGS Media. We will be glad to answer your questions.


Thursday 12 May 2016

You call that a Password

In my last post I eluded to the need for people to use strong passwords. I have received so much communication on the subject that I decided to dedicate this week’s post to the world of passwords.

I’ve worked in IT for quite some time now, and the amount of times I have sat at someone’s locked machine and had to think – ‘Now what would XXX use as their password, just to have gained access a few minutes later. Too many people are in the habit of using the obvious. 

A recent analysis of a large sample of passwords reviled that people still used simple to crack password to protect their systems. I am referring to passwords such as: 123456, password, qwerty (3 of the most commonly used passwords out there.) After that people tend to use names, their own, their spouses, their children, even their pets. Then the next group are people that use the sporting alliances for their passwords. All it takes is a little knowledge for even the most primitive of hacker too guess these. And most hacking tools would gain access almost instantly. 

Technology users need to adopt safe password protocols.

Strength

As I have said, a strong password is one that cannot be easily guessed, or hacked by a brute force attack in an acceptable amount of time. That means no words likely to be found in a dictionary, no common names, no dates of birth, and nothing too short. 

Passwords should be of a reasonable length, be a random mixture of lower and uppercase letters, utilise numbers and symbols. Although some systems limit the complexity, you should always try to adhere to this rule.

If stumped, try out one of the many on line password generators.

Variety

Do not use just one or two passwords to secure all your systems. It may be a no-brainer, but so many people fall into this group. If a hacker cracks one password, then they will have access to your whole digital life. Just think about it.

Do not make it easy for them. Use a different password for every instance where you need to use one. You may think this may make your life hell, we are all so connected these days, we access countless secure systems. Don’t worry about this, check out the section on TOOLS.

The Week Link

Quite often we, as users, are the weakest link in the whole security chain. To mitigate the risk your yourself post, you should follow a couple of rules.
  1. Never write a password down, just in case you forget it. Anyone may see this in passing.
  2. Do not share your password with others. If someone needs to be on your machine, you should log them on yourself. Then watch them until they have completed their task at hand.
  3. Decline invitations from your browser to remember your passwords. Doing this is just the same as having just one password for all systems. As, when someone manages to gain access to your machine, all they have to do is fire up your favourite browser to gain access to all your on-line accounts.


Tools

The thought of remembering dozens of completely different passwords may fill you with dread. However, if you are not the sort of person that is predisposed to remembering random collections of gibberish, there are tools out there designed to do this for you. 

Relying on a single system is not ideal, however it could be the compromise you are looking for. One word of warning though is: Research the merits and pitfalls of any such systems you intend to adopt prior to their implementation.

After reading this, if the digital life fills you with fear, don’t worry. Just take the steps outlined and they will help keep you safe in an ever growing digital world. Alternatively, if you would like more advice on security in the digital age, or are interested in a digital security audit, please feel free to get in touch with us here at VGS Media.


Friday 6 May 2016

Securing the Smart Home

As the world of the Internet of things (IoT) and more homes embrace Smart Home technologies, it is obvious that security will become a growing concern, and even a growing issue if left to manage itself. When a home is connected to the internet it can become a target for hackers.

So, the question is, as always, what can occupants of a Smart Home do to protect themselves against the unwanted attentions of potential hackers?



  • Stick to reputable brands: The Smart Home is an emerging market place, and companies new to the market (or who are just dabbling with the market) may not provide as secure a product set as those who are more established. That is not to say that innovation is not good for a growing technology trend, but consumers’ must take care to evaluate their options.
  • Ensure that any updates are regularly applied: Like all things IT, as and when any vulnerabilities are identified, providers of equipment work quickly to build in protection against that vulnerability. Ensuring your equipment’s software and/or firmware are always kept up to date will protect you against those known security risks.
  • Always change the default password settings: Many people stick with the default passwords on devices. This is a major flaw, as all it takes for the hacker to gain access to your devices, and then you home, is to guess what those devices are, and then they are in.
  • Always use a strong password: A strong password is one that cannot be easily guessed, or hacked by a brute force attack in an acceptable amount of time. That means no words likely to be found in a dictionary, no common names, no dates of birth, and nothing too short.
  • Ensure you router is secure: After all your router is the gateway to your network. A poorly configured router makes it so much easier for cyber criminals to gain access to your devices. Also note, the above recommendations on passwords, equally apply to the router.
  • Take professional advice: Finally, if you are going to dive in to the world of the Smart Home, consider taking professional advice. Companies who specialise in the designing and installation of Smart Home systems are more likely to be aware of the risks than the every-day member of the public. Plus, they may even surprise you of what you can achieve on your budget.

If you want to find out more about Smart Homes, Home Automation, or even the security risks around the various technology sets, feel free to get in touch with us here at VGS media.

web: media.vgs.global