October 2009

Increased demand for video in all its forms is hogging the pipes

[Commentary] Now that we're in the digital age, Internet traffic volumes are giving way to traffic jams that can bring business operations to a grinding halt. The primary driver is the explosion of Internet video. Its exponentially larger file sizes and bandwidth requirements strain the infrastructure, challenging organizations to meet the ever-growing demand. And more is added daily at a rate of 33 minutes of video per second.

This increased demand creates four issues that require more efficiency in managing video content:

1) Supply and demand -- Every video file opened places a demand on bandwidth. For example, a 150 mb 90-second video requires there be enough bandwidth not only to push 150 MB through, but to do so in 90 seconds. Otherwise the viewer will experience pauses and stuttered playback. Delivering 150 mb in 90 seconds equates to a bit rate of 13.3. If 10 people watch a file simultaneously, you'll need an Internet pipe that can handle 133 Mbps.

2) Moving video files from one user to another. Most email mailboxes and file-sharing systems have limits on the size of files they can move and store. They are not equipped to meet the requirements of even simple videos, making it difficult to share or upload files.

3) Multiple copies, multiple locations -- As video is made available to customers on the Web, each copy increases the amount of storage required.

4) Lack of "search" ability -- Video files are often stored on a network using office-document based filing systems - with a separation between video for internal and external use. It may work now, but the proliferation of video will require a metadata-based search function that doesn't yet exist.

Federal CTO: Smart Grid, E-Health Records and Broadband Need CIO Input

Federal Chief Technology Officer Aneesh Chopra challenged state chief information officers to work more innovatively and collaboratively and he ticked off a laundry list of issues where state IT professionals will play a key role in President Barack Obama's innovation strategy. Speaking at a meeting of the National Association of State Chief Information Officers (NASCIO) in Austin (TX), Chopra said state and local technology executives should be involved in planning for health information exchanges, smart grids and broadband initiatives. They also should be helping to spur entrepreneurship and ensure that schools can continue to teach in the event of a flu pandemic.

Pulling Forward the Benefits of Healthcare IT

The Health IT Standards Committee within the Department of Health and Human Services will begin an unprecedented effort to get the public's view on how our work might "pull forward" the benefits of healthcare information technology (IT). Specifically, we're interested in uncovering new strategies to accelerate the adoption of health IT standards. This effort began with the passage of the American Recovery and Reinvestment Act of 2009, calling for recommendations on standards to promote safe, secure, healthcare information exchange. "Standards" are really the guardians of quality, consistency, and interoperability. Without thoughtful, clear and uniform standards, we cannot enable the seamless and secure exchange of electronic health information (or the benefits that accrue to providers and patients from such protected exchanges). So, while the exploration of technical standards may seem mundane to some, it is foundational to electronic health records (EHRs) and electronic health information exchange more broadly. In other words, it's worth paying some attention to, and voicing your opinions.

Missouri, Illinois make push for their share of billions in broadband grant money

Missouri is hoping the federal broadband stimulus program will support its MoBroadbandNow initiative — a public-private partnership that seeks to get high-speed Internet to 95 percent of all residents within five years. The state is offering $28 million in matching funds, targeting middle mile and last mile projects key to the initiative. Illinois has set aside $50 million to support dozens of proposals in that state. Some of them, at least at first glance, are puzzling — particularly in the case of more than $30 million that has been requested by the University of Illinois at Urbana-Champaign. It's odd when you consider that just last year, the campus was named the nation's most wired campus in a survey by PC Magazine and The Princeton Review.

U.S. policy toward cyber attacks needs new focus, experts say

US policies toward defending against cyber warfare need to take a different approach than the government has against other forms of attack, three cybersecurity experts said Thursday. It will be difficult for the US government to voice and follow through with a policy of cyber deterrence, like it has with nuclear attacks, said Martin Libicki, a senior management scientist specializing in cybersecurity at Rand, a nonprofit think tank. First, it's difficult to identify attackers, especially when some nations appear to be sponsoring private attackers, he said during a meeting of the Congressional Cyber Caucus. But it may also be difficult for the U.S. to follow through with threats of counter attacks, when U.S. cyber experts don't know how much damage the attacks could do, he added. With cyber attacks, some countries may be willing to gamble on the U.S. capability, unlike with nuclear attacks, he said.

Leahy plans hearing to look at cybersecurity cooperation

Senate Judiciary Chairman Patrick Leahy will soon hold a hearing to examine how federal agencies are working together to prepare for and combat high-tech attacks. Leahy's chief privacy counsel, Lydia Griggsby, said the panel will ask witnesses about ways cybersecurity programs can be improved at the Justice and Homeland Security departments. That came as a key Senate Homeland Security and Government Affairs panel announced a similar hearing for today that will focus on how agencies can better use taxpayer dollars to protect mission-critical networks.

Newspapers aren't doing as badly as you think

[Commentary] Recent data provided newspaper lovers with fodder for despair and newspaper haters with fodder for glee. It might be a case of making too much of a few numbers and ignoring some important ones. First of all, there's nothing ipso facto shocking about a decline in patronage of 10 percent in six months. Many political blogs and cable news shows have seen their audiences fall by much more than 10 percent since the feverish fall of 2008. And advertising at plenty of online publications has fallen by a similar amount.

Balloon Boy Narrative Flies

For bloggers, the ongoing fallout from the infamous October 15 "balloon boy" hoax was the top subject last week-and anger permeated much of the online commentary. From October 19-23, fully 32% of the links to news-related stories from blogs were to the balloon story, according to the New Media Index from the Pew Research Center's Project for Excellence in Journalism.

HHS' IG plans audits for some health IT programs

The economic stimulus law is causing numerous new health information technology audits at the Health and Human Services Department, according to a new fiscal 2010 work plan released by HHS' Office of Inspector General. Under the law, the Centers for Medicare and Medicaid Services (CMS) will distribute about $30 billion in incentive payments to doctors and hospitals through 2016. Medicare will pay about $18 billion, and Medicaid around $12 billion, according to the Congressional Budget Office. Those payments will go to providers that have purchased and demonstrated the so-called "meaningful use" of certified electronic health record systems. Oversight of those payments, implementation of IT system modifications to manage those payments, reviews of frauds and errors related to those payments, and audits of breach notification requirements are among the areas for IT-related audits to be started in fiscal 2010 as a result of the stimulus law, the work plan states. The plan was made available recently on the HHS IG's Web site recently. The IG intends to review CMS' oversight and program management and the procedures to prevent duplicative and fraudulent incentive payments and CMS' compliance with the law's new breach notification requirements for personally identifiable information and medical identity theft.

Digital Data Make For A Really Permanent Record

Information doesn't fade the way it used to. Documents that once upon a time could be counted on to be filed and forgotten are now finding an afterlife in digital, searchable form. Roxana Geambasu is a computer science graduate student at the University of Washington in Seattle, where she's been working on self-destructing data. The simplest application is a form of e-mail that comes with a finite life span. The system is called Vanish, and it works by encrypting your data — e-mails, photos, Facebook posts — then placing the decryption "keys" in several places around the Internet. The keys are readily available to anyone for a few hours. But as the keys disappear, the message rots away. All copies become unreadable; even the copies made along the way — at the Internet service provider, at the National Security Agency, wherever.