Category: Operating system issues

Controlling Wi-Fi and Bluetooth on your iOS 11 device

Articles

If you can’t manage your iOS 11 device’s WiFi or Bluetooth from the Control Center, you may have to go to the Settings App.

iOS Control Centre’s Wireless Toggles Don’t Turn Off Wireless Radios | Lifehacker Australia

My Comments

Apple has just rolled out iOS 11 as an update for your iPhone’s or iPad’s operating system and, as expected with “.0” versions of operating systems’ major functionality updates, there will be a few bugs and issues here and there. This is typically due to Apple, like other software vendors, rushing the major-functionality version of the software out the door to satisfy the vendor’s marketing team’s needs. In this case, the goal here is to get the new iPhone X and new iPhone 8 range, which will be loaded with this operating-system version, ready to sell to the crowds queueing outside the Apple stores and mobile phone retailers on the day they are released i.e. 22 September for the iPhone 8 and 8 Plus, and 3 November for the iPhone X.

One of these is the inability to manage Wi-Fi and Bluetooth from the Control Center on your iOS device even though the buttons do exist there to enable and disable this function. Here, you may want to disable one or both of these functions for your privacy when in the vicinity of Wi-Fi networks you don’t trust, to save battery runtime when you are not connected to a Bluetooth peripheral or a Wi-Fi network or simply as part of troubleshooting a Wi-Fi network or Bluetooth peripheral connection.

The symptom shows up in the form where pressing the Wi-Fi or Bluetooth icons in the Control Center has no effect on the Wi-Fi or Bluetooth functionality. But you can work around this by going to the Settings app on your iOS device. Then you tap on WiFi or Bluetooth to select the appropriate function you want to control.

Disable the appropriate function by sliding the switch to the Off position whereupon you will see no references to Bluetooth or Wi-Fi activity and the green marker will disappear. Or enable the appropriate function by sliding the switch to the On position where you will see the green marker appear and references to the Bluetooth or Wi-Fi activity appear.

Of course, keep an eye on the Settings app for newer “point-release” versions of the iOS operating system and update your iOS device with these newer versions as they arrive. Here, these versions will typically rectify bugs, security exploits or weaknesses that become knowledge to Apple.

Send to Kindle

Microsoft cuts down the out-of-action time users face during the Windows upgrade cycle

Article

Windows will be improving the time it takes to upgrade the operating system

Microsoft is tweaking the Windows 10 upgrade process to reduce downtime | Windows Central

My Comments

A common situation that we face when we update or upgrade the operating system on our computers including our mobile devices is that the device is out of action for some time while the update take place.

Here, the holy grail for operating-system maintenance is that the updates take action once they are delivered rather than needing us to restart the device at all. In the context of business, this means that workers and business owners are able to stay productive without waiting for an update cycle to complete.

Most of these processes involve downloading the necessary files that contain the newest software code then performing fail-safe procedures. This is before the device is rebooted as a measure to make sure the extant software files are unencumbered before they are replaced with the freshly-downloaded files. Then the update procedure makes sure that everything is in place before allowing the user to interact with the system.

Microsoft identified some of the problems associated with the upgrade cycle associated with their Windows operating system and found that a lot of the preparatory work could take place before the system has to be rebooted.

Previously, the user-created configuration and other data had to be backed up and the operating-system files were prepared for installation after the computer was rebooted to instigated the software-update cycle for Windows. Now, from the Windows 10 Fall (Autumn) Creators Update onwards, these procedures will take place before the system has to be restarted. This is because most of these procedures are simply about copying files between locations on the System Disk.

The data-migration action will take place after the system is restarted and the user data will be restored once all the downloaded files are in place. Then the system will be restarted in order to make sure all the functionality is effective and, like with major functionality upgrades, the user may have to interact with the system further to enable this functionality.

The idea behind this move is to have all the preparatory work done while you are able to work with your computer so that it is out of action for a minimal amount of time.

The question here is whether this improved software-update process will take place for maintenance-level updates like the regular software patches and security updates that are delivered to keep Windows secure.

There is still the issue faced with all of the operating system update procedures, especially with significant updates or where mobile devices are concerned. This is where the update requires the device to be rebooted twice and spends some time out of action during that cycle. It also encompasses the requirement for regular computers to boot at least once while patches and security updates are being deployed.

But Microsoft’s step with improving the software-maintenance cycle for the Windows 10 operating system is getting us one step closer towards cutting down on the downtime associated with this process.

Send to Kindle

Making sure your business laptop’s fingerprint reader works with Windows 10

Fujitsu Lifebook S-Series SH771 ultraportable

You may have a problem with the fingerprint readers on these business laptops after you upgrade the operating system to Windows 10

Those of you who had purchased a business laptop equipped with a fingerprint reader may find that this feature doesn’t work with Windows 10. The situation can be very difficult if you had participated in the Windows 10 free-upgrade program that happened from 2015 to 2016 and you may have foregone the use of this security feature after that upgrade.

What can you do?

Remove the existing fingerprint-authentication software from the laptop

Use the Windows 10 Add/Remove Programs option to remove the fingerprint-reader software that the manufacturer supplied with your laptop computer. It may also mean that you have to remove the password vault program that came with your laptop computer and you were using to keep your Website passwords with.

The reality is that some of the business laptops came with software installations where a third-party fingerprint-management program was part of the package. This may be due to the fingerprint reader not having driver software that could work directly with Windows at the time the machine was released or the program offering more “enterprise-friendly” features than what Windows and a baseline password vault could offer for the business laptop’s user class.

If you still value the feature set provided by the fingerprint-management program or depend on its compatibility with certain other management software, it may be a good idea to look for and download the latest versions of that software.

Update the fingerprint-reader’s driver software

HP Elitebook 2560p business notebook fingerprint reader

The fingerprint reader on this HP Elitebook may be able to run the same driver software as one installed on some Lenovo ThinkPads

You would then have to update your fingerprint reader’s driver software to the latest version that can work with Windows 10. This is because the newer driver software takes advantage of the application programming interfaces associated with Windows 10’s Hello authentication mechanism.

Some laptops may require you to update their software relating to their BIOS / firmware and chipset before you progress any further. This is a process you would have to do from your laptop manufacturer’s support Website.

One way would be to open Device Manager in Windows 10 and identify then select the fingerprint reader’s entry in the device list. This will be listed under the Biometric Devices class of devices. Right-click that device and choose “Properties”. Click the “Driver” tab and select the “Update Driver” option to make sure it is up-to-date.

Or you could visit your laptop manufacturer’s support Website and download the latest version of the fingerprint reader’s driver software. Then you install that software, whereupon you may have to reboot your computer as part on the install process.

Sometimes a particular laptop manufacturer may not have the updated driver for the fingerprint reader that is integrated in to their business laptop. Here, you may have to do a Google search for details regarding the make and model of your business laptop and how to enable that machine’s fingerprint reader in Windows 10. This is because a particular fingerprint-reader subsystem may be used by two or more manufacturers in their product lines during a particular point in time. For example, the Lenovo website hosts the Validity Fingerprint Common Driver for Windows 10 which has been found to support most of the fingerprint scanners integrated in HP business laptops like the Elitebook 2560p.

On the other hand, you may find that the latest version of the driver software that they host is the Windows 8.1 version. Here, you can get by with this version for your Windows 10 computer thanks to the use of similar APIs.

Set your laptop up for Windows 10 Hello authentication

The next step will be to set up for Windows 10 Hello – the authentication framework that Windows 10 uses for advanced authentication methods like biometric authentication.

Here, you go to SettingsAccountSign In Options. Then you will have to create a PIN number, which is what you use when you log in to your machine. If you log in to Windows using your Microsoft Account credentials, you will need to create a PIN number, which will become a machine-specific alternative credential.

There will be an option to sign in with your fingerprint which will be enabled thanks to the newer drivers that you installed. Click on that button to sign in with the previously-mentioned PIN if you have created that or to create a new PIN number, before you enrol your fingerprints as your sign-in credentials.

If you still want to “swipe in” to your favourite Websites with your finger, you would need to acquire the latest version of the password manager that came with your computer like HP SimplePass, Softex OmniPass or a similarly-competent password vault that uses fingerprint recognition out of the box.

Conclusion

What this means now is that you don’t have to see the fingerprint scanner on your business laptop computer as being redundant just because you have upgraded your computer to Windows 10.

Send to Kindle

System recovery images–how about updatimg them

Lenovo ThinkPad Helix 2 connected to Wi-Fi hotspot at Bean Counter Cafe

The recovery image on these computers could be part of an update program to simplify refreshing them with the latest version of the operating system if they fail

Increasingly a lot of computer systems, especially laptops and tablets, are making use of so-called “recovery” images. This same practice also applies whenever an organisation is using a disk image with the operating system and applications that are the software component of a standard operating environment.

These are a disk image of all of the operating system and supplied applications that are delivered by the system manufacturer or value-added reseller and installed on the system when it is first set up. The computer makes use of these images if the computer has to be taken to “ground zero” due to a virus or corrupt data or before the user hands the computer to someone else. Newer operating systems use these images as part of a system refresh routine in order to remove corrupt data and bring stability to the computer’s configuration.

But what can happen is that as operating system and application developers keep refining their software, what exists on these system recovery images represents software that is way out of date. This reminds me of a support visit where Microsoft Word was continually crashing on a desktop computer and I had discovered that the computer was running an “out-of-the-box” version of Windows Vista which hadn’t had any service packs installed.

Typically, this will lead to reinstalling any and all patches and updates that were rolled out since the recovery image was created. But how can this be resolved?

One way would be for the manufacturer or value-added reseller to create a “recovery image service pack” and deliver that either as a USB stick or through an authenticated download to the computer users. Then the users install this service pack to replace the original recovery image to have an up-to-date reference image. This cond be created at regular intervals such as every six months.

Another way would be to create a dynamic system image that consists of the latest versions of the operating system and application files. The changed files can be added ot that image as part of installing the latest patches. Similarly, an “image update” app could check for newer hardware drivers for the hardware that is integrated with the computer system itself.

These issues may involve determining how installation and recovery disk images are built wiht a view to focus on the images referring ot major versions and editions of the software concerned along with any peripheral drivers. In the latter case, it may be about obtaining hardware-series-specific drivers rather than drivers that focus on that particular piece of hardware.

As well, with operating systems like Windows and OS X being offered with free major-version updates, the recovery image may also be about installing the latest major version of that operating system’s edition.

Send to Kindle

Why do you need to safely remove or eject removeable media?

USB memory key

USB storage device

As you use a computer, you will have to get in to the habit of removing or ejecting external or removeable media safely and in a proper way rather than just unplugging the device or pulling out the card.

What is this about safely removing or ejecting removeable storage?

Mainframe and similar large computer setups required the operating system to logically mount a tape or disk pack after the system operator installed the medium in the appropriate drive. This procedure makes the files on the medium available to the operating system and computer programs

USB external hard disk

USB hard disks are more critical with this procedure

Then when the medium was finished with, the system operator had to logically unmount the disk or tape which forced all files to he written back to the medium and the operating system to deem the files on the medium to be unavailable. This procedure was also simplified when the tape and disk-pack drives used electromechanical readiness detection like sensing when a lid or door was closed or a tape was past the heads to let the host computer know that they had media on board and were ready to work with it. It would then require the operator to logically mount the medium and make it available to the system’s programs, typically by typing a special “mount” command.

Desktop operating systems like MS-DOS did away with this to simplify the operating procedures for most people especially as they were used just by one user compared to the previous mainframe systems that were used by multiple concurrent users. It also allowed the use of low-cost disk and tape systems on these computers.

Here, these operating systems immediately wrote back all file changes to the disk when a file was created, modified or deleted. As well, if a program was after a file, it would perform a directory search to determine if the file was there on that disk and the operating system didn’t cache the removeable medium’s directory structure in to the host’s memory. In a lot of cases, the act of closing the disk drive’s door or inserting a 3.5” floppy disk cause the operating system to start reading the disk’s directory in to memory.

But the Apple Macintosh maintained a similar operating requirement to the larger computer systems where you had to logically remove a floppy disk or CD from the system typically by dragging the disk’s icon to the Trash before the computer ejected the disk. This was facilitated with these computers having floppy drives that implemented electromechanical load-eject mechanisms and no hardware “eject” button ever since the platform was created.

This was carried through with Zip drives and other similar removeable-media drives that used any form of electromechanical load-eject mechanisms. The presence of an eject button on these drives typically worked as a way of telling the operating system about an intent to remove the medium so it is logically unmounted and was also implemented with newer iterations of the MS-DOS / Windows operating system along with driver programs for earlier iterations of that operating system.

Similarly, those of you who have used the MiniDisc format, especially with an MD deck or a music system that has an integrated MD recorder, may notice this taking place when you are recording to these discs. What will happen with these decks is that a message will flash up on the unit’s display screen that it is writing all the changes to the disk when you press the eject button or power off the unit before the disk is available or the unit switches off. This makes sure that all of the recording and editing activity is properly committed to the disk and is intact.

Why was there a need to tell the operating system that you were intending to remove the medium

If removeable media is removed by surprise, there can be problems with the quality of the data that is written to the medium because the operating system and applications think that certain files on the medium are available to be worked with.

This can lead to corrupted files because all the changes to the file being worked on haven’t been written to the medium completely. There are also issues with the files being locked by programs that are writing back the necessary changes so that other programs can’t interfere with this process, and if a program hasn’t released these locks or committed all of the changes, the files may not be available for other programs to work with. In the worst cases, your computer can go in to a headspin if it is working with a file that exists one minute and doesn’t exist the next.

How do you safely remove USB removeable media?

Windows Explorer (File Explorer) eject option

Eject option in Windows Explorer

With a computer, you make sure that you have closed the files you are working on if you were using a program to work with them. Then you perform a safe-removal procedure that is dependent on your operating system.

Macintosh users simply drag the icon representing the removeable storage to the Trash icon at the bottom right of the Desktop screen. Then there will be a message to say that it is safe to remove the medium.

Windows users can do this in two ways. They can open Windows Explorer (File Explorer) or My Computer and right-click on the removeable storage which will be represented as its own drive letter. They then select the “Eject” option to begin safely removing the storage device.

Safely Remove Hardware icon in Notification area

Safely Remove Hardware icon in Notification area

The other method requires you to click on the Notification Area on the Taskbar and right-click on the “Safely Remove Hardware And Eject Media” icon. Here, you are presented with a list of USB storage devices that are connected to your computer. Click on the one you want to remove to begin safely removing it. In some cases, a physical device may represent two or more logical volumes (drive letters) because it has been partitioned as such. Here, you select the physical device’s name to safely remove that device.

Safely Remove Hardware devices list

Devices available to remove

USB-based removeable-media adaptors like floppy-disk drives, Zip drives and memory-card readers have the ability to safely remove a particular medium or the whole device. Here, you can click on the medium to remove the card or disk or click on the physical device name to remove the device before you unplug it.

Safely remove hardware devices list

Two logical devices in one physical device – the one that is written clearly is the one to remove

This is more important with those devices that handle multiple media types like some multi-slot memory-card readers or devices that have a combination of fixed and removeable storage options like some digital cameras and camcorders that have internal storage along with an SD or microSD card slot. In the latter situation, these devices would have fixed storage greyed out while the removeable storage is written in black.

I have prepared a PDF reference sheet about the procedure needed to safely remove your removeable media from your Windows computer. Download and print this and keep it by your computer if you or others need to know how to do this properly.

Android users would go to the Storage menu and select the “Unmount SD Card” option for the SD card or “Unmount Mass Storage” for storage devices connected to their mobile devices via USB “On The Go” connectivity.

Safe to remove notification

It is safe to remove

For other devices like A/V devices that write to an SD card or USB memory key, you would have to go to the device’s menu and select the “Unmount”, “Remove” or, more likely, “Eject” option. This process would be analogous to ejecting a tape, CD or MiniDisc so you can work with another medium.

Of course, powering off the equipment properly such as selecting a logical shutdown option would prepare any media or removeable devices attached to the equipment for safe removal.

Conclusion

Once you know how to properly and safely remove media or detach USB storage devices from your computer or similar device, you can avoid situations which can place your computer’s reliability or the data on that medium at risk.

Send to Kindle

Apple have fixed the iPhone message bug once and for all

Article

Apple releases iOS 8.4 with new Music app, fix for crashing bug | ARSTechnica

My Comments

Apple have just rolled out version 8.4 of the iOS mobile operating system and the main headline feature that this came with is the Apple Music streaming-music service which came about due to their takeover of Beats by Dr. Dre.

But this version of iOS also fixes a bug that placed iPhones, iPads and iPod Touches at risk of crashing if a specially-formed message came in via iMessage or other message services. This was due to problems associated with handling standard ASCII and Unicode character combinations. To get their iOS devices back to life after a crash, they had to do things like ask correspondents to send pictures.

Any iOS user can update their devices either over the air by visiting the Settings screen then selecting “General” before clicking on “Software Update”. Or they could use the USB charge/data cable to plug the iDevice in to a regular computer equipped with iTunes and use that software to deliver the update to the device.

Send to Kindle

Simplified hand-switching for pointing devices

What is the problem?

Work needs to be done to make it easier for left-handed and right-handed users to use the same computer

Work needs to be done to make it easier for left-handed and right-handed users to use the same computer

A feature that I notice is sorely missing from Windows is the ability to switch between left-handed and right-hand use of the mouse without having to go to the Control Panel and select the Mouse option there.

It would be OK for a person who has a normal hand to “switch” the computer to work to their hand using this method, but would be difficult in some circumstances.

One of these circumstances would be where a computer is shared amongst multiple users with one of the users being left-handed and others being right-handed. Examples of these include workplace, school or public-access computers or computers shared amongst members of a household including houseguests such as the common “his ‘n’ hers” setup.

Windows mouse control panel

Mouse Control Panel dialog – Windows 7

Another circumstance is where a user has to switch between left-handed and right-handed operation as part of a physiotherapy requirement for their hands or simply to keep their hands supple. It is something that is becoming common with older people who want to stay active with their hands.

But having to head to the Control Panel or similar preference settings in your operating system each time you have to do this can bewilder people who don’t have much confidence with technology.

There are ways that Apple, Microsoft and the open-source community could facilitate this.

What are the possible solutions?

Hot-key selection

One would be to use something like a hot-key combination or a simultaneous-mouse-button combination to switch between the operating modes. This could be an option that one could enable in the preferences settings for the pointing devices.

Having this feature would earn its keep with shared computers, workplace computers and public-access computers because users only need to press a certain key combination or operate the mouse buttons in a certain way to “switch hands”. It would also earn its keep with users who find navigating dialog boxes very bewildering and intimidating.

Maurice Tejado wrote an “add-on” utility for Windows (available through CNET Download.com) that allows you to “switch hands” using a hot-key routine.

Set preferences on a pointing-device basis

Another way that could work even better would be to set the operating mode for different pointing devices. Here, you could have two mice connected with one sitting on the left hand side of the keyboard and one on the right hand side. Or you could resolve to use your laptop’s integrated trackpad as a “left-hand” device and a Bluetooth mouse as a “right-hand” device or vice versa. Here, you could set one device to be left-handed while another device is right-handed.

This function is supported by some desktop Linux distributions but isn’t supported on Windows or Mac OS X. But there is a third-party free utility that can support this in the form of EitherMouse which supports multiple pointing devices in use at the same time with different settings.  This can cater also for users who are slow with trackballs and trackpads but quick with mice.

How can this be done better?

Having to use add-on programs to achieve this goal can become awkward, especially when it comes to computer performance and stability and operating systems could go better by baking this kind of functionality in to their pointing-device code.

As well, some computer users and IT departments don’t have confidence in the use of add-on programs because of the fact that these programs can be poorly written or can contain questionable code that can jeopardise computer stability and security. This is more so with those of us who had passed through the “bulletin-board” / “download-site” / “CD-ROM” era of computing where there was a lot of poor-quality software for download.

Rather, operating system developers could write this functionality in to a subsequent version of their products to answer these needs more effectively and especially cater towards older users who are still using today’s technology.

Send to Kindle

An operating system rewrite may make it run smoothly on older hardware

Article

Lenovo ThinkPad X1 Carbon Ultrabook

After a few versions, operating systems on computing equipment will need to be reworked

Apple iOS 9 upgrade could make old iPhones feel new again | The Age

My Comments

A common practice that takes place when an operating system is being written for a computing platform is that extra code is bolted on to the existing code to give it more functionality or cater to newer hardware. This happens due to newer peripheral types or connection methods being available to the computing platform or these devices being improved; along with security and stability questions that are raised through the software’s lifespan being answered.

But after a succession of releases, the operating system’s software-footprint becomes increasingly larger and ends up being slower to run. In the case of battery-operated equipment like smartphones, tablets and laptops, this same situation places a strain on the amount of time you can run this device on its own batteries.

This is more true when the operating system is partnered with older hardware that can be slower or not have enough storage capacity. It then comes to a tipping point in the operating system’s life that the software has to be rewritten from the ground up for improved performance and to have the newer abilities factored in to the software’s codebase.

This had happened with Windows when the security enhancements that were added on to Windows Vista made that version of the operating system become too slow and unwieldy. Microsoft subsequently rewrote the Windows codebase to provide for a highly-stable highly-secure operating system in the form of Windows 7.

It also happened with Android where version 4.3 Jelly Bean and 4.4 Kitkat became unwieldy with certain functions like handling Bluetooth or security-related functions. Android 5 Lollipop had a lot of this functionality written in to its codebase rather than being tacked on thus making for an operating system that was more stable.

Now it is happening with Apple’s operating systems – the iOS mobile operating system and MacOS X operating system. Both these operating systems will be undergoing a rewrite with minimum emphasis on new functionality but more to iron out the bugs. The Age article highlighted the fact that iOS 9 will work more “tightly” on older iPhones like the iPhone 4 Series, giving some sort of freshness to these devices.

A reality that can happen after one of these major overhauls is that as the computer scene changes and the operating system undergoes further revisions to accommodate the new changes, it could end up being bloated again. Again, this is the time that one of these major rewrites would have to take place in order to keep devices of that platform running smoothly.

Send to Kindle

What is happening with the way Android products are updated?

Article

Sports scoreboard app

Microsoft slams Android updates, claims Google ships a ‘big pile of… code’  | The Verge

Microsoft takes a pop at Android updates | TrustedReviews

Microsoft disses Android: ‘Google ships a big pile of … Code’ | Android Authority

My Comments

A common complaint by people who use Android phones and tablets is that it takes too long for an operating-system update to materialise on their device after Google releases the software code. Microsoft, a key competitor to Google, described Android as a “heap of … code” during the keynote speech for the Ignition 2015 business-computing conference’s keynote speech.

Typically what happens is that the update is delivered to the hardware manufacturers who will package it with their software like shell replacements before issuing it. In the case of smartphones or tablets that have wireless-broadband functionality, these updates have to be modified and approved by the telecommunications carriers before they are allowed on devices that their customers use.

Google has worked around this by using the Google Play Store to deploy updates to their software and, in some cases, offer plugins. Some manufacturers are even using this path or their own app store to roll out updates to their software.

Other platforms like iOS and Windows Phone allow the operating system’s software developer to push updates independent of manufacturer or carrier approval. This is similarly true for desktop operating systems like WIndows and OS X.

But what can Google do about this if the goal is to roll out security patches and bugfixes in between platform updates? This is important when, for example, my Samsung Galaxy Note 2 handset was failing frequently when it came to discovering Bluetooth devices and this was due to bugs in relationship to Android Jelly Bean’s Bluetooth stack which was based on Bluetooth LE / Smart functionality tacked on to an existing Android Gingerbread or ICS Bluetooth stack.

A way to assure the ability to work with manufacturers and carriers yet roll out the important patches could be to allow the deployment of the patches without need to have the prior approval. But Google would need to work with the manufacturers when rolling out major platform updates like when transitioning from KitKat to Lollipop.

A platform update for Google Android and any other operating system should also be about rewriting various parts of that operating system that gain functionality boosts that will change the device’s behaviour rather than “tacking on” the new functionality. This is what led to Windows Vista being criticised by the industry for its performance because the new security abilities were “tacked on” to an existing Windows XP codebase.

Send to Kindle

Why do I describe non-Apple operating systems and hardware as being open-frame?

Sony VAIO Fit 13a convertible Ultrabook at Rydges Hotel Melbourne

Windows 8 – open-frame as can be

I make references to computer systems or mobile devices based on platforms like Windows, Linux or Android as being “open-frame”.

This is compared to Apple’s computer systems and mobile devices which are focused around hardware and software interfaces are peculiar to that manufacturer’s devices. As well, it takes a long time for Apple to integrate a common hardware or software standard in to a platform although other platforms are already implementing the standard; or an accessory or peripheral vendor has to go through hoops to have a device considered “fit” to work with Apple’s products.

Android - also open-frame

Android – also open-frame

Computer systems that are based on an “open-frame” environment has the ability for one to connect peripheral devices easily to it no matter who the hardware or software vendor is. An example of this includes smartphones and tablets implementing a microUSB Type-AB socket for charging or transferring data.

Open-frame computer systems can attach themselves to a network or quickly discover and benefit from or share network resources using commonly-available standards that aren’t particular to one particular vendor. As well, the companies behind the platforms are quick to meld support for most. if not all. of these common standards and specifications in to the next major version of their software platforms and will nurture these standards through their platform’s lifecycle.

Naim UnitiServe - provides music va UPnP AV / DLNA to equipment independent of vendor

Naim UnitiServe – provides music va UPnP AV / DLNA to equipment independent of vendor

There are many examples here that I could mention.

One example is a Windows 7 or Windows 8 computer or an Android smartphone can quickly associate with a WPS-capable Wi-Fi wireless network segment at the click of a button on the wireless router as what happened when I stayed with some friends up in Sydney and when I stayed with another friend up in Ballarat. In both instances, I brought in my Samsung Android smartphone and a Windows-based review-sample laptop  to these locations and brought them on to the hosts’ networks to benefit from their Internet access.

DLNA collections listed as sources on the TV

DLNA content collections listed as sources on a Samsung Smart TV

Another example is to have the ability to discover multimedia content held on a network-attached storage device or media-server software using UPnP AV / DLNA standards which many manufacturers and software developers offer. I have seen this demonstrated many times with setups based around different manufacturers and software developers and, one time, this provided a simple on-ramp for a couple to show travel pictures to the mother-in-law.

Sony SBH-52 Bluetooth headphone adaptor NFC tie clip

Touch your NFC-capable phone on the clip to pair it with the headphone adaptor

Yet another example is my Sony SBH-52 Bluetooth headphone adaptor that quickly pairs with my Samsung Android phone when I touched them together in a same vein as a Braven Bluetooth wireless speaker that I reviewed. In some cases, this even applies to the ability for Android users to exchange contact details with each other or Windows 7/8 computers via Bluetooth or NFC.

How I see the personal-computing scene for both regular (desktop) and mobile applications is that there will be balkanisation taking place between Apple and the rest of the field and this has been underscored in the computer press as simply “the cult of Apple”.

Send to Kindle