Menu
Olympics, Security Holes, IT Job Dissatisfaction and More

Olympics, Security Holes, IT Job Dissatisfaction and More

The latest technology news including why Endpoint security holes are problem, charitable opportunities for IT workers, advancement in PC data theft and the push for Broadband across the US

Beijing Prepares for "High-Tech Olympics"

All over Beijing, Olympic countdown clocks tick off the seconds until August 8, 2008, at 8:00pm, when the opening ceremonies of the Beijing Olympic Games begin.

But for China, the most important competition began in 2000, when Beijing was awarded the right to host the 2008 Olympic Games. Like firing a starter's pistol, the award began the race to build the IT infrastructure to stage and support one of the world's largest sporting events. Producing a "high-tech Olympics" was one of the Beijing Organizing Committee's (BOCOG) objectives. With a published operating budget of US$2 billion, BOCOG estimates the technology portion of the budget at more than US$400 million.

Preparing for the Olympics is like no other feat of project management. Leading the charge is Jeremy Hore, chief integrator of the 2008 Olympics. Hore spent six months with his company, Atos Origin, working on the Athens Games, and another six weeks on the 2006 Winter Games in Turin, Italy. "The most difficult thing is that the deadline is fixed," he says. "On other projects, you can delay if you need to, even if it has a bad impact." There are also limitations on which vendors' equipment and services may be used. "You don't have much control over choices because of sponsorships and partnerships," says Hore.

IT planning for the Games began in 2003. Forty per cent to 50 per cent of systems planning is carried over from the last Olympics and adapted to local conditions. In 2004, Hore and his team began designing the fully redundant systems, determining their requirements and testing needs. The following year they concentrated on building the systems and testing facilities to fit in the two years of trials required by the Olympics committees. Just as athletes train for years for the Games, IT people hold 200,000 hours of trials in total. Atos dedicated about 100 people to conduct tests. Some systems, such as those for managing accommodations for athletes and Games personnel, had to be operational three years in advance.

One new technology getting a limited run-out during the Olympics is IPv6 (Internet Protocol version 6). It does a better job of supporting applications like videoconferencing and high-definition television than its predecessor, IPv4, and offers opportunities for lower-cost construction of security networks and monitoring devices. IPv6 may help security forces watch the millions of spectators, but it is doubtful it will help spectators watch the Games. Fang Meiqin, senior consultant at technology consultancy and research firm BDA, says, "I don't think the ordinary consumer will notice [IPv6 is in use]. It's mainly for the organizers' and government usage."

So in terms of technology advances enjoyed by visitors, the Beijing Olympics may fall short. Case in point: China is offering 3G services but only for BOCOG affiliates who received one of 15,000 handsets provided by Games sponsor Samsung. Customers from other nations, such as Japan, Korea and the UK, will not be able to use their 3G phones in Beijing.

-Steven Schwankert

Endpoint Security Holes an Open Door for Attackers

Everyone knows that there's no such thing as 100 per cent security, but it's unlikely that most businesses realize how insecure they really are. Now, new research on endpoint security exposes their vulnerability.

Eighty-one per cent of corporate endpoints probed by IT security and control product vendor Sophos failed basic security tests, either by lacking Microsoft security patches, having disabled client firewalls or missing endpoint software updates.

For 40 days, Sophos ran its Endpoint Assessment Test, a free, online scanning service that checks for endpoint security vulnerabilities. The test was performed against 583 corporate endpoints from around the world. Test results showed that 63 per cent were missing at least one Microsoft security patch; more than half had their client firewalls disabled; and 15 per cent had out-of-date or disabled endpoint security software.

"Ultimately, machines that fail such a test represent 'low-hanging fruit' for cybercriminals and a real danger to their corporate networks," Bill Emerick, vice president of product management for Network Access Control, said in a statement. Sophos says 39 per cent of those tested were part of an organization with fewer than 100 employees; 36 per cent had between 100 and 1,000 employees; and 25 per cent were from organizations with more than 1,000 employees.

-Shawna McAlearney

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about Atos Origin AustraliaBillBillionCreativeDialogueEdge TechnologiesEndPointsExecuNetFCCGoogleInspirationIT PeopleMicrosoftOraclePegasusPegasus SolutionsPrivate BusinessSamsungSophosStanford UniversitySybase Australia

Show Comments
[]