FCC Seminar

On Tuesday, February 23 the FCC along with its partners, the Consumer Financial Protection Bureau (CFPB) and the Department of Health and Human Services’(HHS) Administration for Community Living, hosted a webinar highlighting how older adults can protect themselves from current COVID-19 scams.  

The webinar provided tips on how to avoid vaccine-related scams and resources available to older adults. A recording is available on the event page and on YouTube.  

When it comes to the vaccine, you can’t pay to skip the line or reserve your spot. Inbound calls or texts that ask for your Social Security number, financial details, or insurance information to reserve your spot are always a red flag. Learn more about how to protect yourself. 

Vaccination plans will vary across state and local governments. Check with your state or local health department to learn when and how to get the COVID-19 vaccine. You can also talk with your health care provider, pharmacist, or health insurance provider to learn more.   

For additional information about the webinar, please contact FCC Outreach at outreach@fcc.gov.   

Microsoft Ads for Surface Pro 7

Speaking of scams, Microsoft seems to be using an oldie but a goodie, bait, and switch. I followed a sales link to look at the Surface Pro 7 (I had a chance to see one in action a few days ago and learned some things). Advertised at $550 you can get what amounts to a boat anchor worthy device; if you want a usable surface pro you will spend $900 + $150 in insurance (not just extended warranty).

What is the difference? At $550 you get an i3 based tablet (too slow even for word processing or video streaming) add a keyboard at $100 (discounted to $70, less with a coupon) and you are at $620ish. But, the i3 version I used was virtually unusable, so upgrade to the i5 version and choose the version with 256gb ssd (because windows eats up 96gb of the 128gb version) and you find yourself with the $850 version of the surface, add a keyboard and you hit $900 but get free shipping.

Why do I all but insist on the $150 insurance policy? Because the included warranty provides no protection if you drop the unit, spill on it, spit on it, or if the screen fails, and the screens have been routinely failing between the 6 month and 18 month period of ownership. Replace a screen without insurance at $250 + $150 minimum labor and $70 shipping (buy a new unit if you started out with the i3 version). damage a USB port and expect a $375 + $150 minimum labor + $70 shipping repair. Oh, and don’t forget that leaves you without the unit for a minumum of 10 days and the unit you get back will be blank (factory reset).

Other than the above, it looks and feels like a nice, very flexible tool for a variety of uses (windows-based). I have noted that almost all second-time owners sprang for expensive cases to protect these quite fragile devices (well, no more fragile than the ipads they say they are competing with in the recent advertisements).

Historically, I have recommended Surface machines for field devices, backup devices, and for office devices that needed to fill a wide variety of specialized needs. Mostly, these products have been successful in those roles when the appropriate model with appropriate accessories are selected. Because they are low power, battery operated devices and quite small there have been some issues getting them to work reliably with some peripherals (the USB ports do not provide the standard current that a desktop or full laptop does) and there is usually one one port available to attach peripherals to the unit. Using one to drive a projector or large screen requires some careful configuration and often an experienced pc+video technician, suffice to say it is not a non trivial enterprise to setup.

Simple Guidance

Scams on the internet are so frustrating! What can you do? My first recommendation is a simple one. If you get a message, popup, or any other form of indication that you need some piece of software or update AND it is from a manufacturer you know or is very common in the industry, DO NOT click the link! Instead, use your browser and go to the manufacturer’s site and get the update or feature or software directly from the manufacturer’s website.

If there is any doubt in your mind whether you need the update or the software recommended ask someone in the profession (a consultant, geek squad, etc.) for guidance. It may be an indication you are being phished or have malware trying to get established on your computer.

As an additional thought on scams. When I suggest that people go to the manufacturer’s website I am not suggesting that you search for it, I mean type in the address directly in the browser’s address bar. If you don’t know the appropriate website, this is when you should be calling a professional for guidance. Really, most of us would much rather assist you before there is a huge mess to clean up.

Honest, that image is not from your antivirus package, that is a bug in its glory trying to get you to help it get installed.

More Scams

I am preparing to give a seminar on computer basics and it occurred to me that most people never think twice about what they plug their electronics into. It’s a wall outlet and it provides power; but, is it the right power? Just as I was working that out, I get a call and it is someone who has been caught by a browser internet scam.


So, first off, computers come with one of three kinds of plugs. I refer to the 3-prong, the 2-prong polarized, and the 2-prong unpolarized. The 3-prong is a grounded plug and the ground pin provides protection for the user of the device as well as guaranteeing the polarity of power provided is correct (assuming the outlet is correctly wired). The 2-prong polarized is used for equipment that requires correctly polarized power (hot vs common) while the unpolarized plug is usually reserved for devices that work just as well with or without correctly polarized power.


Over the years I have repaired quite a few power supplies that had been operated over time with reversed polarity power. In the early days that meant replacing the diodes and a few capacitors. In the later years, it was simply easier to replace the power supply and not worry about which components failed. That is the way with our society now, a failed component outside warranty doesn’t really concern us, we simply replace and get on with our lives.


Earlier I mentioned a scam. There are so many now and some are quite hard to detect; but, let me offer a few tips to help you recognize a scam. None of the computer manufacturers and none of the operating system providers watch your system to spot viruses, so, if your computer pops up any kind of message (other than one from the anti-virus package you have installed) that is an attempt to infect you and it (the code behind that message) is trying to get you to do things to allow the infection. And, none of the current products will suggest you call in to a “special” number to remove the bug. Microsoft will NOT call you and alert you to an infection. Lenovo will not call you and IBM business services will not call you alerting you to some issue with your computer. All of the manufacturers have automated their update services and switched to passive support of clients.


What do you do? If you suspect a scam or viral activity (or malware of any kind), try updating your anti-virus and then run a full scan. Then, if you are still suspicious, try running a second opinion malware scanner (Microsoft has one on their website as does Sophos and Malwarebytes). Lately, I have had the best luck with the Malwarebytes free version; but, all three are excellent. If the scam has disabled your ability to navigate or get to your anti-virus, turn your computer off and try restarting, this will disable 50% of the browser-born phishing attempts. In all cases, don’t operate on the internet without an up-to-date anti-virus or net-based protection of similar function.

Word Processing?

ZDnet recently published a story on “Laptops we love” and I was struck by a number of things. They asked a number of their journalists what was their favorite machine to write on and their responses surprised me. The majority spoke up for a relatively mid-range model of laptop ($1600ish) but then confessed that they used something else; several admitted using a tablet with an addon keyboard to type in their columns for publication.


Additionally, the choice of operating system seemed rather random, some chose Windows, some IOS, and a few went with ChromeOS and one even chose Linux. I had expected professionals to choose devices with full-sized keyboards, relatively large screens (15″ or larger) and either Windows or MacOS.


Having had my eyes opened up a bit, I realized that word processing isn’t demanding of even the least powerful of modern devices. All of the current products on the market are capable of being good word processors and it is up to the user to decide the balance between portability, ease of typing, ease of viewing and a variety of other criteria.


Earlier I kind of dismissed Linux as an obvious choice for the OS of a word processor; but, with Libre and Apache office (Open Office) being native coded and compiled for various Linux versions, the user has the same quality of tools available for many kinds of word processing tasks as the user of Windows or MacOS. I have been using a Raspberry Pi400 (linux based computer) to do some graphics work, spreadsheets and yes, word processing.


So why, when asked, did the majority of those journalists suggest a mid-range of laptop? I think they and I are all caught up in the numbers game and we have forgotten the real criteria; does the machine do all the things we use, and in doing so is it fast enough that we don’t have to wait for it? Then again, it wasn’t long ago that even expensive laptops were slow enough to force us to wait on occasion; and, you can still buy those laptops. (a quick reminder, solid state storage makes a huge difference as does a good processor like the i5, the i7, Ryzen3,5, or 7 and so forth. The days of the Celeron and the i3 should be over, long over)

Disposable Society RANT!

Rant on! Apple and Samsung have both re-tuned their warranties and extended warranty plans for their new phones. Depending on how you acquire them, these phones can run from $700 to $1200 to “included in your contract”. However, replacing a lost phone can give you a pretty good idea of the actual cost of the phone ($799 for a Samsung A21). It is clear that both companies have their eye on maximizing profit from these products as they have made it more cost-effective to forgo the extended warranty & replacement plans in favor of simply replacing the product with a newer model.


This is just the tip of the iceberg as they have increased the cost of repairing a damaged phone to the point where replacement is often more attractive than repair. For Apple, the $15 batteries can be replaced for $70 + $7 shipping, and expect it to take 3-5 days to get to Apple and a similar 3-5 days to come back. For Samsung, I haven’t found any real numbers yet for the battery or cost to have it replaced; but, I expect more than $50 for the battery and another $40 or more labor. Why are these procedures so expensive? The batteries are glued in and removal is non-trivial as is the proper installation of the new battery. Fortunately, Samsung has arranged for a lot more sites to be authorized for the replacement and other minor repairs so you may not have to wait a week to get your phone back, depending on where you live.


Still, the cost of common repairs ($249 for an iPhone12 screen + labor) on these new families of products are a significant percentage of the cost to replace the device. And, if you read the list of exclusions in the warranties and extended warranty plans, you can easily pay 30% or 40% of the cost to replace to extend a warranty that may not cover most of the anticipated issues. Given that we see new improved models every 6 months to a year and the rate at which the new rapid charge batteries decay, how badly do you want to pay that much to get your phone repaired?


Okay so Rant off (on our ever increasingly disposable world)!


Even with the foregoing, there are situations when the extended warranty and replacement plans can be cost-effective. If the device will be used in dangerous (for it) environments or by someone who will not take care of it, replacement plans can be attractive. For the rest of us, a screen protector and case are probably a better investment with an eye to replacing the device after 2 years of use. Along these same lines, you can choose devices that are water proof and made to survive considerable rough treatment. There are still some firms that will water proof many of the standard models if that is a risk for your device.


I am careful to choose phone models that have user-replaceable batteries and user-upgradeable memory because I have a history of keeping my phones for 4 years or longer.

iPhone 12 not consumer safe?

Oh my! I read that Apple has acknowledged a potential safety risk surrounding the use of its iPhone 12 series of products. In addition, Apple has also published a workaround for the “damage” caused by the interaction of its MagSafe products and iPhone 12’s. For me, the issue has to do with FCC regulations regarding consumer products and their safety when used in “customary and ordinary ways”.


A quick bit of history about FCC certifications may be called for here. Back in the dawn of consumer electronics, the FCC required that all components undergo safety testing, and radiation testing and that sample units be supplied for verification by the FCC and licensed safety labs. As the volume of products increased, these requirements were gradually relaxed in order to foster innovation and speed new products to market. At that time, commercial products (ones used in non-public exposure) were required to meet Class A certification (the laxest standard) while products aimed at consumers required Class C certification (much more stringent standards and far more testing). Class B certification was in between the two and was to apply to products used by professionals who understood the risks and how to manage them or use products of that type safely. In another move to foster innovation and reduce the cost to bring products to the American consumer market, the requirement for meeting Class C certification was altered to allow Class B devices to be marketed to the masses.


Today, the FCC allows products to be verified as meeting a specific safety class by type matching; that is, if your new product is similar to one that was previously approved or verified by any means, that new product can also be considered as verified as meeting the same safety class. So, the new iPhone 12 series products meet Class B standards by this very process. I see two issues already where this may not be appropriate. First, the magnetic field created by the iPhones may exceed safety standards by a considerable amount, and second, some of the new phone signal types (5g, 5g wideband, etc.) may also not be safe under certain circumstances.


What caught my attention was that Apple came out in response to consumer questions and suggested that folks with certain medical devices like pacemakers or insulin pumps should keep their iPhones at least 6″ distant from any such device at all times. The second point of interest for me regards an issue with the iPhones and the new MagSafe accessories. In a similar warning, Apple warned folks that exposure of the leather cases to the interaction of iPhones and the MagSafe accessories may damage the leather or any similar materials and to keep any such materials 6″ from the phones or accessories (and to replace their phone cases with units made of different materials). Realize that human skin is just one such material and I read that as “keep these products at least 6″ from your skin at all times to reduce the risk of injury to your skin.”


How serious is this? Well, if you feel any warming of skin near where you wear your phone (or any other consumer device), and particularly if the device isn’t itself warm to the touch, you definitely should be concerned for your long term health. If your medical device issues warning beeps when your phone is brought near it, no matter how occasionally, you definitely should be concerned. Neither of this kind of event should be acceptable at any time and should result in Apple products being reduced to Class A certification at best.

Personally, I suspect that this admission by Apple clearly identifies that their new products are NOT appropriately safe for consumer use, that their response is a clear statement of these products not meeting Class B standards, nor meeting any of the FCC’s categories for certifiable products. In particular, where medical devices (wearables or implanted) are concerned, those devices have reason for primary bandwidth and interference protection from all other devices and the Apple products are clearly violating this protection given customary use of these products (ie, wearing them on a hip or in a pocket or tucked into clothing) in my opinion. With luck, the FCC will review its approval of these products and cause some modifications for user safety.

Modern advances for transportation?

Technological advances in automobiles and particularly in aides for the driver have enjoyed some significant advances of late. While many advances may have been aimed at making a driverless car possible; some could also improve the safety and ease of driving. Take, for instance, a cruise control that can be set to follow the car in front of you and a lane maintaining system that can keep your car centered in a specific lane. Combine these two and it sounds like you could get in position, set the controls, and take a nap on your way to a destination.

We may still be a bit away from the time when auto-driving cars are common let alone dominating the morning commute, but the technologies to make that possible are real if not matured. By setting up cars to form a network so they can exchange data: relative position, speed, obstacles, and planned path, the future seems attainable. The fly in the ointment would be older cars in the “pack” that can’t share and agree upon who goes where. Oh! And let us not forget the unanticipated factors of weather, animals, landslides, rocks in the road, etc. All of that will take some serious development to manage.

Back to the current advances. I have seen advertisements for cars that have “following” modes for the cruise control; presumably, that would maintain a preset distance between your vehicle and whichever vehicle happens to be directly in front of you. I have also seen advertisements for cars (same brand and others) that have a lane holding system (keeps the car centered in a given lane). Finally, a system that would let you set your cruise control on your RV and ease back to grab a beverage. I am not certain our current level of sophistication will allow such features to be used safely. Admittedly, both could make driving considerably safer if the driver remains alert and in a position to override the automatic features; but, how alert will a driver remain if their continuous input is not needed?

It looks to me like a lot of computer power and sophisticated programming will be required to take the next steps in semi-automation and full automation of vehicle operation. I believe the computer power is available and can be made small enough and rugged enough to survive vehicle operation; but, getting the software matured sufficiently to hand all (or almost all) possible situations safely is going to take some time and some changes to our highways, streets, and our expectations. I also look forward to improvements in the various sensors, locating devices, and cameras to help bring us through the next steps.

Safety of modern transmitting devices?

It continues to amaze me that supposedly learned folks will vilify comparatively safe modern conveniences when others which have a far greater potential for impacting health are ignored.  For instance, the power meter or water meter that transmit a very short distance (very low power) only occasionally when compared with your cell phone which is in continuous contact with a tower 1-5 miles away (higher transmit power).


Dating back to the 1930’s and 1940’s the Navy was doing research on exposure to high-frequency signals.  They were concerned that putting radar on ships and smaller craft would put crew members in danger or that perhaps RADAR could be used as a weapon against enemies.  Fortunately, they were unable to develop an efficient weapon; but, they also determined that exposure to radiation in the mid bands (700mhz to 1ghz) had little to no impact on skin, internal organs, or brain tissue.  One of their findings (since repeated) was that high power transmissions at close range could warm the skin and, if continued, the internal organs as well.


In order to protect us, the FCC has restricted the amount of power that handheld devices and household devices (cellphones, wifi routers, IOT devices) may transmit with an eye to preventing the type of exposure that could warm the skin even in contact.  The potential for trouble begins when you start to expose living tissue to higher frequency signals like the 2.4ghz, 5ghz (high-performance routers), and the 100ghz and higher used in the newest 5G devices.  Sadly, the further above 1ghz (1000mhz) the signal gets, the more energy it carries, and the less we know about the long-term effects of exposure to it.


The higher energy in the signal (5G wideband for instance) greatly enhances its ability to carry data (speed and reliability) making its use a highly sought-after practice as demands for ever faster and more reliable internet dramatically increase.

A brief look back on Electronics

I have recently watched a few NOVA episodes on the planets.  This lead me to consider the changing electronics we have developed for and used in the various space programs.  Numerous advances that we now take for granted were developed to improve the likelihood of successful missions.

From the beginning, the space programs had a need for more durable components.  Improved materials to mount switches (transistors) on was an early improvement just as silicon transistors replacing vacuum tubes (relatively fragile by nature) made taking electronics to space possible.  Then the development of integrated circuits (a single piece of silicon providing multiple transistors in an even more durable package) further advanced the ability of electronics to survive as well as igniting the race to ever smaller components.

Smaller had an amazing benefit; smaller was intrinsically faster, lighter, and required less power to operate thus reducing the need to dissipate heat.  An amazing synergy if you think about it.  Difficulties in reliably producing IC’s (integrated circuits) were overcome in the process of each leap to smaller devices.  Similarly, smaller size allowed the inclusion of more and more transistors in a single component.

A separate series of advancements was leading to the inclusion of ever more complicated and varied components (circuits) in the silicon (nand gates, op-amps, T-bar, etc.).  At some point, the complexity of the IC made a sidestep and the result was the microprocessor.  The microprocessor evolved in multiple paths resulting in ever more complicated processors bringing us to current processors and System On a Chip (SOC) packages.

Remember those Apollo missions?  the combined computer power (speed, computational capacity, memory, storage) of the computers onboard the missions is easily eclipsed by that in a single $30 cell phone, and mission control’s computers are easily eclipsed by most smartphones.

Imagine The difference in quadrupling computer capacity while lowering the weight from a few hundred pounds down to 1 lb while reducing power consumption from a few thousand watts down to less than 100 milli-watts.

A peek into the future?

C/NET named its top products of 2020 some time back; but, not included in that list were some items that were thought to not be ready for the market yet or the market not ready for them. I will try to highlight a few of these because of their importance in what we face today and tomorrow.

The use of mRNA to produce a flexible vaccine in record time that promises unprecedented success for a vaccine of any type. In 10 short months, several vaccines have been developed, tested, verified and deployment begun. This process is likely to give rise to several other treatments for maladies previously endemic to humanity.

The introduction of WiFi 6 routers (an early name perhaps) bodes well for the many of us who face new challenges in WiFi demand both at home and in the office. Previous generation routers were good enough for what they were designed to accomplish; but, the new demands posed by the responses we have made to the Covid inspired environment lead to far more instantaneous demand of already taxed WiFi resources within the home network or the office network. For instance, managing 2, 3, or more simultaneous ZOOM sessions will overtax current generation routers. The new routers are being designed specifically with this kind and level of demand in mind.

The Apple M1 chip, an ARM chip and close cousin to the System On a Chip (SOC) found in the Raspberry Pi computers brings with it the promise demonstrated in the Pi 4 and Pi 400 computers, excellent performance, low power draw, simple integration, straightforward software adaptation, and easy software development, not to mention excellent flexibility and easy system implementation. Whether Apple can succeed in bringing this family of chips to the market remains to be seen; but, the new benchmarks illustrated give the competition something to shoot for.

VPN’s (Orchid VPN is an example) continue to evolve to provide better protection and protection for more users. Once limited to providing a secure point-to-point network over shared bandwidth or secure bandwidth alike, VPN’s can fill more roles as they themselves mature and as available bandwidth improves. Not long ago a business network was blessed to have 100Mb in-house bandwidth; now, that speed is pedestrian with gigabit and terabit networks coming into their own. With internet speeds exceeding 200Mb common and gigabit internet available (at a price), VPN’s can now provide the kind of speed once only available within the scope of a local network, out into the WAN (wide area network).

The new basics of computing

I was setting up a couple of new computers this last week with an eye towards how I will go about explaining computer basics in the current computer world. Setting up machines from scratch (or from commercially installed windows or Linux, or macOS) has become much more time consuming than I remember it being just 8 years ago when 40 minutes was more than sufficient time to get to the GUI (graphical user interface) and start using the computer. Now, the updates can take forever (1.5 hrs on a fast Debian system to 28 hrs on a fast windows 10 system) and the wait for initial setup simply adds to that (okay, the Linux setup time is very fast if you ignore updates).

So, is the first thing we should discuss when talking about computer basics the need for updates, security, network connectivity, and data security? That could take hours and wouldn’t have the user any closer to typing their first letter; but, they are necessary topics, particularly for those new to using a computer. Perhaps it would be good to back up even further (along the lines of basics) and discuss power sources with an eye to user safety and good long term operation of the computer, protection from power surges, brownouts, and all the other issues that can befall any device connected to the outside world.

Thus let me get on my soapbox and rant a bit. Yes, good clean power and well-grounded data sources are important (some computers do not use a grounded power cord – laptops mostly) and the ground is the preferred route for any high voltage (lightning) events to use instead of the computer or you (so, it might not be a bad idea to disconnect that laptop from everything during a thunderstorm). Yes, updates really are necessary because the threat posed by malware, viruses, hackers, and a host of other sources requires constant improvements in system security. In addition, many new devices coming out on the market require additions to the Operating System in order to work with your computer.

On the topics of malware, viruses, and hacking, a multi-pronged defense is what I currently recommend. First, keep your OS up-to-date (so you are less of a target to known threats). Second, keep a firewall between you and the outside world (either built into a router or running locally on your system). Third, keep and maintain (more updates) an anti-virus product running in the background. And Fourth, choose a “second opinion” malware scanner to use when anything suspicious occurs (because the first target of many hacks is the installed anti-virus)(Malwarebytes, Sophos, and Microsoft all provide reliable such products).It helps to have a very basic understanding of how your network connectivity (access to the internet, wireless printers, scanners, etc.) works. No, I am not suggesting you want to learn about transfer protocols and the like; but, are you connected by wire? Or, are you connected wirelessly by WiFi or Bluetooth? Does the device that connects you to the internet provide an adequate firewall? And, roughly what kind of data speed (bandwidth) does it provide. Generally, your ISP can provide this information either when they connect you up or upon being asked about your LAN (Local Area Network).

Data security, at its basic level, hasn’t changed in 30+ years. Storage devices fail (fact) and when they do, your photos, documents, etc. can be lost if you do not have backups or synchronized copies (perhaps in the cloud), or just plain copies on some other device (a second computer, thumb drive, USB drive, or other backup devices). The same applies when you are working on any project, document, spreadsheet, etc. you need to save early and often and even create multiple copies on occasion. The use of encryption is up to the user in most cases and prevents data recovery attempts in the case of equipment damage or failure while making it very difficult for a successful hacker to get anything useful from you.

Clear as mud? Like operating a vehicle, there is a lot to understand in order to do so safely and efficiently. Various service providers can be quite helpful if asked (they might well assume you don’t need help with the basics). Duplicating important data remains a necessary if inconvenient step.

Raspberry Pi 400

The Raspberry pi 400 I ordered has arrived and working with it has opened my eyes to what I have come to expect and accept from Microsoft and Apple. In the Microsoft & Apple world, computer owners and users are a source of income as well as a pool of alpha and beta testers. How wonderful is it to get paid to have folks test your software instead of having to pay a team of programmers and randomized users to test that software!

Compare that to what happens in the Linux world (the Raspberry Pi 400 runs a version of Debian Linux, or any other OS you care to load that supports ARM processors). Software is developed mostly in the public domain, tested and improved by volunteers driven by a love of the products, the environment, and the community that has grown up around Unix, Multix, and Linux (among a few others – I prefer OS-9) all tracing back to the work of Kernighan and Ritchie.

Back to the Raspberry Pi 400, like previous Pi computers it is comprised of a System On a Chip (SOC) with some interesting peripherals (USB ports, mini-HDMI ports, socket for a Micro SD card, Bluetooth, 802.11 a/c, gigabit ethernet port, all built into a compact keyboard. Provide power, a mouse, and an HDMI display and you have a complete computer more than adequate for all web services, video streaming, word processing, spreadsheet work or play and much more.

This version debuts a 1.8ghz processor with nice video support. The “kit” I purchased came with a power supply, a USB mouse, a mini HDMI to HDMI cable, a 16GB memory card with linux pre-installed, and an easy to read book to introduce you to the system, its OS, and some of the included software. Libre Office is preloaded along with Scratch (a beginners language), Python, and Java IDEs (integrated development environment). A web browser built in Chromium gives good access to the web that behaves very much like Google Chrome. On top of all this, the system boots up into a Graphical User Interface any Mac or Windows user will find familiar if a bit less confusing.For the $120 (including shipping) how wrong can you go for a school access computer, a teaching tool, or a home computer for browsing the web, watching streaming videos, reading and writing email, etc.

News: 5G and M-1

2 nice news bits today. Some groups have already started to deploy new wifi networks to previously unserved neighborhoods using the new 5G band plan type equipment; and second, Some data about the new Apple M-1 CPU+GPU chip is coming out so we can have some idea of what to expect.

The Wall Street Journal posted a story today about a non-phone group who is putting up 5G based networks in previously underserved or unserved areas of the Dakotas. The cost to provide high-speed network access using the new equipment is greatly reduced (compared to 802.11 equipment) and makes it possible to provide high data rates with inexpensive equipment. I suspect there are several other groups looking to do the same kind of deployments as 5G equipment becomes more available.

Apple did a really nice dog and pony show a while back making some interesting claims about their new M-1 chip that they plan to build laptops and maybe some tablets around. First, there is nothing new about this chip; you can find it in some of Microsoft’s tablet/tablet PC’s and a really well-established version can be found in Raspberry Pi products like the Pi 400. Looking at a few early benchmarks of the M-1, it is likely to offer middle-of-the-road performance initially with many restrictions on what software (apps) and peripherals will work with it.

While I am excited about the efforts of some to get 5G based equipment up to provide better WIFI for many, time will tell if the production of these products can fulfill the promise of early successes (yes, I am really excited about this, and have been watching for it to begin). The new Apple product announcements really do not excite me. Apple has made outlandish claims before with reality sinking in after product rollout (the original iMac could be sighted as an exception but it was years late in actual delivery) and this suggested rollout looks so much like those. Please understand, the new ARM chips are fantastic and do make design and production of specialty or general purpose devices very simple (by comparison to Intel chips). Ramping up performance from being competitive with other low-power products to be competitive in the laptop or Desktop market is a huge challenge.

Finally, this move by Apple may allow them to further isolate themselves from the huge R & D effort that competition between AMD and Intel has created (graphics chip makers have also enjoyed a lot of push as they try to keep their offerings competitive with the embedded graphics). For me, the one real positive is that this will provide a lot of stimulus for the ARM chip industry which has done very well on its own but has not been able to jump up to the level of Intel or AMD in chip development.

Alert! Ransomware is making a comeback

Alert, the bad people are back at it again. If all the new scams weren’t enough, ransomware has a new twist and it is booming. Instead of the authors deploying ransomware in its latest incarnation, they have gone to contracting it out, designing it to be custom configured by middlemen and deployed by ghosts, who collect their money and disappear only to reform under new names, identities, you name it.

This new style of ransomware comes with some really clever new techniques to avoid detection and some new approaches to maximizing the income potential of holding someone’s data hostage. And, this new incarnation of ransomware also steals data while encrypting it.

First, a hint of the new techniques. Since the ransomware is sold as a configurable suite of exploitative modules, it isn’t easy for anti-virus software, devices, or even behavior watching protections to recognize. Second, one of the features is a really slick module that can funnel disk requests to the operating system’s cache manager and then use (Windows or Apple) built-in operating system components to encrypt the data while in the file cache, tag it as new, requiring synchronization with physical storage and let the operating system finish the dirty work as part of its normal duties.

Surprisingly, the ransom for most of these attacks is very affordable; because they (the bad people) really want folks to pay the ransom. This identifies for them the people and companies whom they can then apply further (virtual) blackmail upon with an expectation of getting further money. So, you pay the $150 ransom and are contacted by a representative of the ransomers who often sets up and performs the decryption of part of the files only to be told that your data was also stolen and will be publicly posted if you don’t pony up lots more money. And they aren’t bluffing, there have already been a few very embarrassing cases where they did just that (posted the “secret” data, identified the source, and advertised it on the open web).

So, how do you protect yourself against this kind of assault? Keep your operating system up to date, your antivirus and antimalware up to date, do regular “full” scans of the data holding machine, and all machines that have access to that machine. Keep your firewall on and as restrictive as possible (in an office consider an adaptive firewall appliance or gateway server). Honest, if you don’t get occasional firewall violations and refusals, your firewall is not restrictive enough.

Having good, current, and disconnected (not available to be “live” updated and thus also corrupted) backups is the best way to recover from most ransomware attacks and many other forms of exploitation. Also having company-wide policies in effect (no alien machines, no disks or drives introduced without proper verification of safety, no gaming, no use of unsecured email services, etc.) can go a long way to reducing your risk and attractiveness to the bad people.

Finally, if you do become a victim of hackers, or scammers, or ransomers, please do not pay the ransom. Instead, seek the assistance of law enforcement, your data insurance provider, IT security professionals, and other professionals as appropriate (each will likely have important insights to help you get through the event with a minimum of damage and cost).

FCC Notice of Rule

Notice of Effective date for Call Blocking Rules

CG Docket No. 17-59

On July 16, 2020, the Commission adopted the Call Blocking Third Report and Order, which adopted rules for the blocking of calls, including two safe harbors and associated protections for the blocking of certain calls.[1]  The rules become effective 30 days after publication of a summary of the Call Blocking Third Report and Order in the Federal Register.[2]  The Federal Register published that summary on September 14, 2020.[3]  Accordingly, the rules adopted in the Call Blocking Third Report and Order will take effect on October 14, 2020.


[1] Advanced Methods to Target and Eliminate Unlawful Robocalls, CG Docket No. 17-59, Third Report and Order, Order on Reconsideration, and Fourth Further Notice of Proposed Rulemaking, 35 FCC Rcd 7614 (2020) (Call Blocking Third Report and Order) (implementing, in part, the Pallone-Thune Telephone Robocall Abuse Criminal Enforcement and Deterrence Act, Pub. L. No. 116-105, 133 Stat. 3274 (2019) (TRACED Act)).

[2] Call Blocking Third Report and Order, 35 FCC Rcd at7650, para. 125.

[3] Federal Communications Commission, Advanced Methods to Target and Eliminate UnlawfulRobocalls, Final Rule, 85 Fed. Reg. 56530 (Sept. 14, 2020).

The First Amendment and our right to Free Speech

Well, Benediktson Computer is once again in its Southwest office in Silver City, New Mexico. Yes, we were chased out of Montana by snowstorms and luckily made the trip safely with no major challenges or issues. I want to try and tackle a difficult topic for me; it has to do with what folks are calling a violation of their right to free speech. I may have a unique perspective on this topic.

First off, the right to free speech is not one that is provided by our government, the bill of rights (first amendment) protects us from infringement of this right by the government. I know there have been some appellate court decisions that appear to have broadened the scope of this protection; but, I am not aware of any high court decisions that have broadened this protection to the point that we are protected from censorship on private lands, services, hosts and so forth.

So, to be clear, Facebook, Twitter, etc. are private services hosted by corporations (presumably for profit) on privately owned and operated servers. Any act of censorship, restriction of content, or removal of content may be annoying; but, it in no way is a breach of anyone’s rights. If (and this is a big if) our government were to offer a similar type of service, then the first amendment might offer us some protection against content censoring on that service.

In addition, private groups hosted on any of these corporate services (please do not make the mistake of considering them government-sponsored or supported) have been given considerable freedom to choose what content they find acceptable (within the framework of the hosting service) and this may be quite a bit more restrictive in many ways (all of this without violating anyone’s rights).

As each of us joined (Facebook for example) we were offered a chance to view and then required to accept and agree to the terms of service for that service. While I will entertain the notion that there are some rights and priveledges of being an American Citizen that we simply cannot sign away, this, in no way, applies to content that we publish onto privately or corporately owned and operated services. One last point, when we publish content on a service (like Facebook) we are making that content public on that privately operated service, potentially causing the owners of that service to be responsible for that content (legally).

Server-based Issues

For those who have had some strange behavior with your Microsoft apps over the last few days (Sept 26 – 29), yes there have been some issues with the Microsoft servers. Microsoft admits to a multi-hour outage over the weekend. I suspect that they were hacked and Microsoft brought the services down to protect users. Evidence? Monday morning I attempted to load MS Edge onto a machine and the antivirus stated that the update was being abandoned because it contained a virus. Also, a number of cloud and email users of 365 and outlook products had the passwords from their products and Microsoft password storage purged during this same period.

If you are one of those impacted, it looks like Microsoft has cleaned up the mess and you can return to using those services. If your password(s) for one or more services was purged, go ahead and supply your passwords manually (as requested by the service in a pop-up) and then look into changing any affected passwords at your earliest opportunity. As always, it is very important to verify which service is requesting a password; if it is for a web service, look carefully at the address and make certain it matches the address for the appropriate service.

There are so many scams in operation out on the world wide web right now that it is likely you have seen or been called by one of the scam operations. There are several places you can look for help recognizing a scam; I can recommend fcc.gov and the many resources they maintain. In addition, a simple google search or bing search will often highlight what others have already encountered and identified. Your favorite neighborhood computer consultant or technician is likely to have already encountered and dealt with any but the very latest of scams and can be an excellent resource before and, sadly after you get involved with a scam.

A few tips, Microsoft is not monitoring your system (well at least not to spot scams or viruses) and will not call you to help you, will not put a full-screen popup on your computer, and will not email warnings to you. Any of these things are evidence that someone is trying to scam you. Generally, these scams are aimed at getting money from you, getting useable information about you or your financial footprint. It is extremely important that none of us give out this information to the scammers, no matter how harmless or helpful it or they may seem, and of course, do not give money in any form to anyone you do not already have a business relationship with.

Another tip, if the nice people who sent you a message or popup or warning offer to install McAffee products for you, or Symantec products, they are quite likely scammers. Why? Symantec owns both families of products and makes them available in bulk for at virtually no cost so they are easy choices for scammers trying to look legit.

Repair or Replace?

One of the questions I am often asked is when do you repair or upgrade and when do you replace? Sometimes the answer is clear and easy to explain; but, often this is a very difficult question resulting from complex criteria. Most of us have a lot invested in our desktop or laptop computers and minor damage simply does not rise to the seriousness level to bring on the need or desire to replace.

Some of the obvious reasons for replacement are age (a 10-year-old computer really is old), cost of repair and maintenance (replacing a $50 dollar part on a $700 computer is reasonable, replacing a $200 dollar part on a $250 computer is not reasonable). Then there is the concern for all the time and effort involved in “moving into” a computer. Generally, a new computer needs a lot of time and effort on someone’s part just to get it up to what the previous computer could do.

While, in the computer world, new is generally faster with more storage and should require less maintenance, it is not uncommon for new to also have left some important, to you, software behind (cannot install for a variety of reasons, or require a new license, and others) or a previously familiar software product behaves differently on the new computer and you have a learning requirement to get back being proficient again. Then there is a break-in period when new electronics can simply have factory testing missed flaws appear.

So, in many cases, there are reasons to consider repairing or upgrading instead of replacing. Each situation is different and the factors that drive the decision can change as time passes.

For many users, I recommend hard drive replacement when performance is the primary issue with a computer and that computer is more than 4 years old. With standard spinning hard drives, this is an age where they can really drop off in performance and reliability. Replacing that older hard drive with an SSD can really perk up a computer’s performance and its data storage reliability in one simple step. Let us not forget that backups continue to be important even with the newer drives as they can still fail.

Computer Glasses

On a topic slightly out of my expertise areas but well developed in my experience. Optics (glasses) for working at a computer. This is an area where I am somewhat spoiled; yes, I have specially made glasses just for working on my computers. And, yes, I feel they make a huge difference.

Last time I had my eyes checked and a new prescription for distance viewing, I also had my optometrist write me a prescription for computer glasses. We discussed the distance from my eyes to the surface of the monitor and she (my optometrist) set up a set of test lenses for that exact distance and we tried a few options and picked the best possible correction for me at that distance.

With this prescription in hand, I ordered my computer glasses including a blue light filter, the latest in UVA and UVB filtering, a non-reflective coating, and a dust resisting and water-repelling coating. Even the latest LED screens cause ionization of particles and tend to cause glasses to pick up dust far faster than normal; this new coating (Crizal is one choice, , Zinni Optical has another “brand”) really does make a difference.

My last pair of glasses I had added polarization on top of all the other features and found the polarization to cause some trouble (tilt your head and the screen appears to go dark); so, since I use them exclusively indoors, I did not add polarization or any form of darkening this time and, I admit, I am happier with this for computer glasses.

Spend some time talking with your Optometrist regarding your specific needs and desires for any common work spaces you utilize. There are so many wonderful tweaks that can be managed to improve your vision in specific environments and the cost of most of them is very reasonable. Task specific optics often run just $40-$60.