Product Review – Dell Studio 15 notebook computer (Windows 7 Home Premium)

I am now reviewing the Dell Studio 15 multimedia notebook computer, which is the first notebook computer to be reviewed in this blog. It is pitched as a portable multimedia computer, in an attempt to push in on the Apple MacBook’s territory as part of the recent general-purpose computing system showdown since Apple and Microsoft reworked their respective desktop operating systems last year.

It is worth knowing that if you buy a computer through Dell, you have a large range of options available to you in how you customise your unit. It ranges from processor types or memory and hard-disk capacities to optical drives, screens or batteries, through software even to how you want the computer to look. So it is worth knowing that the computer that you may specify may not be the same as the one that I have reviewed, and I have prepared a table at the end of the review outlining some variations including the unit I have reviewed.

Look and feel

Dell Studio 15 Multimedia LaptopThe unit has a glossy piano-black top which can be customised with different colours when you order it through Dell’s website/ The back of the computer is rounded when closed but has the hinges brought forward. On the right-hand side, the hinge pin acts as the system’s ON-OFF switch which will light up in white when it is on.

Like most of the recent laptop / notebook designs made by other manufacturers, Dell has moved away from using latches to keep the lid closed. This has made an accessibility improvement which is a boon for people who may have dexterity limitations.

Therefore, all the connections are located on each side of the keyboard, which has been a departure from the norm of laptop design. Similarly, there isn’t any latches that you need to operate to allow the lid to open, which can be a bonus with older people pr people with dexterity problems.


Processor and RAM

The computer is based around an Intel Core i5 multi-core chipset which is considered reasonable by today’s standards for a laptop computer. The review system also comes with 4Gb or RAM on board and works to a 64-bit architecture. The unit can be scaled up to 6Gb at $250 extra.


The Studio 15’s keyboard has a regular look, touch and feel, which goes against an Apple-inspired trend of using “chiclet” keys which look like a calculator keypad. This would appeal to those of us who are good at touch-typing. You can have this machine with a backlit keyboard as an extra-cost option, which may be of benefit for people who travel on night journeys.

An issue that may confuse users is the requirement to press “Fn” with the function key to gain access to their regular functionality, otherwise they become system control keys (display, WiFi, speaker volume, etc). This is infact becoming common as the the keyboard area becomes more cramped on these portable computers.

Another thing worth noticing was that you don’t have an ON-OFF switch on the keyboard area or other obvious areas unlike most other notebooks. Here, the switch is part of the unit’s lid hinge pin on the right hand side and is illuminated in white when the machine is in use.

On-off switch as part of hinge

On-off switch as part of lid hinge


The unit uses a multi-touch trackpad which is highly-integrated with the palm rest below the keyboard. There are only two buttons below the trackpad for use as the equivalent of the mouse buttons. The design yields a dust-proof design which would lead to highly-reliable operation.


The display and graphics subsystem is based on ATI graphics techonology and shows up on an LED-backlit, LCD. You can use an external display that is connected via a VGA socket or an HDMI socket. If you use a DVI display, you would need to use a DVI-HDMI adaptor.

The LED-backlit LCD screen is typical of most LCD screens and there is no colour difference between this display and a regular CCFL display. The main benefit you may have is extended runtime when on the battery and a slimmer lid.

Secondary storage

This unit has a 500Gb hard disk but can be ordered with a 640Gb hard disk at extra cost. What impressed me about this computer was that the whole hard disk was prepared as a single logical volume (drive letter) with space set aside for the operating system and supplied applications.

Slot-load Blu-Ray drive / DVD burner

The review sample came with a slot-load BD-ROM / DVD-RW burner which can play Blu-Ray discs and burn to DVD discs. You will save around $200 if you opt for the same computer without the Blu-Ray option, which may be more of concern if you aren’t interested in “future-proofing” this notebook.

There is the feasibility for one to connect an eSATA-enabled external storage device to an eSATA / USB socket on the left hand side of the machine. As well, there is a built-in multi-format memory-card drive for use with digital-camera memory cards.


This computer is well-endowed when it comes to networking capabilities. It can work with 802.11n wireless networks that work on either the 2.4GHz or 5GHz bands and also has integrated Bluetooth wireless support. There is a Gigabit Ethernet port on the left-hand side for use with Ethernet (or HomePlug) )networks.


The sound comes through as being “full and clean”, otherwise it is typical for a laptop.  I had tested the sound by running a DVD of the “Live Aid” global fund-raiser concert that happened in July 1985. It is also worth knowing that the computer is available to order with a Creative-Labs sound chipset if you want that bit more out of the sound.



Sockets on left side including 1394 socket

The computer does well on connectivity by supplying 3 USB sockets with one being an eSATA socket, an IEEE1394 socket, video out via a VGA or HDMI socket, a Gigabit Ethernet socket as well as audio connectivity via a MIC/LINE-IN and two headphone/LINE-OUT sockets.,

This has certainly become a positive highlight for this machine, especially if it is being intended as a multimedia-focused unit.

Battery performance and usage notes

I had done a “DVD rundown test” on the laptop to find out what the battery lifespan is like under difficult conditions like multimedia activities. This time, I played the aforementioned “Live Aid” DVD straight through and it completed the concert disc which lasted 2 hours, 17 minutes with the wireless-network functionality off. Also, I had run the computer on the default power scheme with the standard battery that came with it and had made sure the battery was charged up. The battery level was at less than 10 percent when measuered with the Windows battery meter when the disc had finished.

I have looked on the Dell Website and they only have a 9-cell extended range battery available either supplied with the system as part of your configuration or as an accessory you can purchase later. Sadly, Dell, like most other laptop vendors, doesn’t supply any DC adaptors which allow you to work with this laptop from a car battery or an airliner’s DC power-supply system. You may have to then look for such adaptors from third-party suppliers like Targus.

The machine doesn’t get hot very quickly and is not likely to burn your knees after a good run of use. This may be typical of most regular-sized mainstream business laptops.

Pricing for test system and recommended configurations

I have created a table with some selected configuration options, especially concerning secondary storage and the price that is highlighted in bold represents the configuration that I am reviewing.

All of these specifications are delivered with Windows 7 Home Premium but I would prefer business owners to look at the Windows 7 Professional which will cost $60.50 extra. Windows 7 Ultimate, which is important if you have sensitive data on your system will cost you $140.80 extra.

  500Gb HDD 640Gb HDD – maximum hard disk space
DVD-burner $1299.00 $1383.70
Blu-Ray and DVD-burner $1537.70 $1622.40


Conclusion and placement notes.

I would recommend this machine as a future-proof “work-home” laptop, preferably for those who drive between locations. It would also find that it works well as a desktop replacement for business and multimedia use, rather than intense gaming.

It may also appeal to those of you who want to do multimedia work on a Windows-based portable machine, especially if you have are working with miniDV camcorders or other FireWire-equipped video equipment.

Send to Kindle

Keeping the WiFi public hotspot industry safe

Originally published: 12 March 2009  – Latest update 20 April 2010

There are an increasing number of WiFi wireless hotspots being set up, mainly as a customer-service extra by cafe and bar operators. But there have been a few security issues that are likely to put users, especially business users off benefiting from these hotspots.

This is becoming more real due to netbooks, mobile Internet devices, WiFi-capable smartphones and other easily-portable computing devices becoming more common. The hotspots will become increasingly important as people take these devices with them everywhere they go and manage their personal or business data on them.

The primary risk to hotspot security

The main risk is the “fake hotspot” or “evil twin:. These are computers or smart routers that are set up in a cafe or bar frequented by travellers, business people or others who expect Internet access. They can be set up in competition to an existing hotspot that offers paid-for or limited-access service or on the fringes of an existing hotspot or hotzone. They offer the promise of free Internet access but exist for catching users’ private information and/or sending users to malware-laden fake Websites hosted on the computers.

Standard customer-education practices

The common rhetoric that is given for wireless-hotspot security is for the customer to put most of their effort into protecting their own data without the business owner realising that their hotspot service could be turning in to a liability. This can then lead to the hotspot service gathering dust due to disuse by the customers it was intended to serve.

The typical advice given to users is to check whether the premises is running a wireless hotspot or if there is a hotzone operating in the neighbourhood before switching on the wireless network ability in your laptop computer. Then make sure that you log on to a network identified by a legitimate ESSID when you switch on the wireless network ability.

Other suggestions include use of VPNs for all Web activity, which can become difficult for most personal Web users such as those with limited computer experience. Some people even advise against using public Internet facilities like Internet cafes and wireless hotspots for any computing activity that is confidential on a personal or business level.

But everyone involved in providing the free or paid-for hotspot service will need to put effort into assuring a secure yet accessible hotspot which provides a high service quality for all users. This encompasses the equipment vendors, wireless Internet service providers and the premises owners.

Signage and operating practices

When Intel promoted the Centrino chipset for laptop computers, they promoted wireless hotspot areas that were trusted by having a sticker with the Centrino butterfly logo at eye level on the door and the premises being scattered with table tent cards with that same logo. Similarly hotspot service providers and wireless Internet service providers used similar signage to promote their hotspots.

But most business operators, especially small independently-run cafes and bars, commonly deploy “hotspot-in-a-box” solutions where they connect a special wireless router that they have bought to their Internet service and do their own promotion of the service. This may simply be in the form of a home-printed sign on the door or window or a home-printed display sign near the cash register advising of WiFi hotspot service.

An improvement on this could be in the form of the ESSID matching the business’s name and listed on the signage, which should have the business’s official logo. Similarly, the network could be set up with WPA-PSK security at least with the passphrase given to the customers by the business’s staff members when they order hotspot service. Most “hotspot in a box” setups that list the customer’s username and password on a paper docket also list the ESSID and WPA-PSK passphrase on these dockets. As well, I would modify the login page to convey the business’s look with the business’s logo and colours. A complimentary-use hotspot could be secured with a WPA-PSK passphrase and the customer having to ask the staff member about the passphrase. This could allow the facility to know who is using the hotspot and the organisation who runs that hotspot can have better control over it.

It may be worth the industry investigating the feasibility of using WPA-Enterprise security which is associated with different usernames and passwords for access to the wireless network. Most portable computers and handheld devices in current use can support WPA-Enterprise networks. This can be implemented with the typical “paper-docket” model used by most “hotspot-in-a-box” setups if the authentication system used in these units works as a RADIUS server and the built-in wireless access point supports WPA-Enterprise with the unit’s built-in RADIUS server. The same setup could work well with a membership-based hotspot service like a public library with the RADIUS server linked to the membership database. But it may not work easily with hotspot setups that work on a “self-service” model such as paid-service hotspots that require the user to key in their credit-card number through a Webpage or free-service hotspots that use a “click-wrap” arrangement for honouring their usage terms and conditions.

The organisation who runs the hotspot should also be aware of other public-access wireless networks operating in their vicinity, such as an outdoor hotzone or municipal wireless network that covers their neighbourhood; and regularly monitor the quality of service provided by their hotspot. Also, they need to pay attention to any customer issues regarding the hotspot’s operation such as “dead zones” or unexpected disconnections.

People who own private-access wireless networks should also keep these networks secure through setting up WPA-secured wireless networks. They should also check the quality of their network’s service and keep an eye on sudden changes in their network’s behaviour.

When wireless-network operators keep regular tabs on the network’s quality of service, they can be in a better position to identify rogue “evil-twin” hotspots

Improved standards for authenticating wireless networks

There needs to be some technical improvement on various WiFi standards to permit authentication of WiFi networks in a manner similar to how SSL-secured Web sites are authenticated. This could be based around a “digital certificate” which has information about the hotspot, especially:

  • the ESSID of the network ,
  • the BSSID (wireless network MAC) of each of the access points,
  • the LAN IP address and MAC number of the Internet gateway
  • the venue name and address and
  • the business’s official name and address.

The certificate, which would be signed by public-key / private-key method could be part of the “beacon” which announces the network. It would work with the software which manages the wireless network client so it can identify a wireless network as being secure or trusted if the signature is intact and the network client is attached to the network from the listed BSSIDs and is linking to the gateway LAN IP.

The user experience would be very similar to most Internet-based banking or shopping Websites where there is a “padlock” symbol to denote that the user is using an SSL-secured Website with an intact certificate. It will also be like Internet Explorer 7 and 8 where the address bar turns green for a “High-Assurance” certificate which requires higher standards. In this case, the user interface could use colour-coding and / or a distinctive icon for indicating a verified public network.

The provision of cost-effective wireless-network management software

There are some programs that can turn a laptop computer in to a wireless-network survey tool, but most of them don’t show much useful information, are hard to operate for anyone other than a network technician; or are too costly. They miss the needs of people who run home or small-business wireless networks or wireless hotspots.

What needs to exist is low-cost wireless-network management software that can work with the common Microsoft or Apple platforms on computers that have common wireless . The software should be able to use commonly-available wireless network adaptors such as the Intel Centrino platform to perform site surveys on the WiFi bands and display the activity on these bands in an easy-to-view but comprehensive manner. The software should be easy to use for most people so they can spot interference to their wireless network easily and can “tune” their wireless network for best performance.

An application that is matching this need is MetaGeek’s inSSIDer, a free wireless-network site survey tool for the Windows platform which I have reviewed in this blog. It has the ability to list all the networks receivable by signal strength, MAC address, SSID or channel; or plot a graph of the networks by signal strength over time; or plot a graph of all the access points by signal strength over channel. This may help with managing your hotspot by identifying rogue access points and “evil-twin” hotspots.

Similarly the popular smartphone and PDA platforms like Applie iPhone, Android, Symbian S60 / UIQ, Blackberry and Microsoft Windows Mobile could have low-cost wireless-network management software written for them so they can make a handheld PDA or mobile phone work as a site-survey tool for assessing quality of service.

Once this kind of software is available for small business and home users, it empowers them to assure proper coverage of their network and check for any “evil twin” or other rogue hotspots being set up to catch customers.


There needs to be more effort put in to setting up secure public-access wireless networks so that people can benefit from portable computing anywhere without forfeiting the confidentiality of their personal or corporate data.

It also will encourage people to gain the maximum value out of their WiFi-enabled portable information devices whether for their business life or their personal life.

Send to Kindle

Mother’s Day Post (Mother’s Day – USA, Canada, Australia, New Zealand)

Mother’s Day is usually the day not just to give a small gift to Mum, but some families may see this day and Father’s Day as opportunities to “pool resources” and purchase a higher-value gift. So I am writing blog posts that appear on these days to provide guidance in purchasing and setting up consumer-electronics and IT-related gifts for your parents.

The kind of gifts that may appeal to Mum include:

  • Electronic picture frames
  • Internet radios and similar network-based media devices
  • A computer that is suited to Mum’s needs and
  • Internet service (if there isn’t any at the place she lives at)

Electronic picture frames

You may think of picking up that cheap digital picture frame at a “big-box” discount store for use as a gift, but there can be some nasty limitations concerning its use. For example, a lot of cheap frames may only source their pictures from a memory card or USB thumb-drive plugged in to the side of the frame. This can cause the frame to be useless if you or someone in your family need to remove the media to revise the pictures held on the frame. This is a very typical situation because you might place a small collection of pictures on an SD card or thumb-drive just to “get it going”, then remove that card or thumbdrive to fill it with pictures derived from various household photo collections.

I would suggest keeping an eye out for frames that either have a large integrated memory or can work with two or more memory devices at the same time. Better off, I would keep an eye out for Wi-Fi picture frames that can work with a home network and bring content in from an Internet service. The service should support “email-to-frame” functionality so you can send a picture from your computer or smartphone directly to the frame. This functionality would be very important when there are the family events like a wedding or the arrival of a new baby.

A Wi-Fi frame with UPnP AV / DLNA functionality can work with a network-attached-storage device that is used as a primary image library. This can be of benefit if you keep adding pictures from different household collections as each family occasion passes through; or as you scan more regular pictures out of the family photo collections.

Internet radios

Revo Domino 3 If your mum likes radio content from a favourite country, you may wish to provide here with an Internet radio. These units offer access to the kind of radio listened to by locals of a favoured country, or other radio programming through the use of Internet audio streams. In some cases, there are channels which play a lot of the “old-time” radio serials like “The Goons”.

These sets are very flexible in the way that they work because of the provision of an auxiliary-input jack and / or an iPod dock. Most of these sets can work with a DLNA-compliant network-attached storage and turn this device into a multimedia jukebox.

The more-expensive sets can work as a primary audio system for a studio or other small apartment due to them having high-quality sound. It may also be worth looking out for Internet-radio “tuners” like the Revo Mondo RadioStation or the Sangean WFT-1 Series, that connect to an existing stereo system so your parents can have Internet radio through their favourite stereo system.

I have written an Internet radio buyer’s guide and have reviewed three Internet tabletop radios – the Kogan WiFi Digital Radio with iPod Dock and two Revo radios – the iBlik RadioStation and the Domino; as well as an Internet portable radio – the Pure Evoke Flow.

DLNA-compliant NAS

An upgradeable DLNA-compliant network-attached storage device can work well alongside a compatible Wi-Fi electronic picture frame or Internet radio as a media library. These units don’t necessarily need to have a computer on the scene at all times. It then means that you can transfer media from a laptop computer that you bring around to one of these devices, which can be of benefit if the only reason for the home network is to provide media to these devices.

Getting Mum who isn’t tech-literate set up at home

A modest laptop with a built-in Webcam and running Windows 7 Home Premium or MacOS X Snow Leopard could work well as an email terminal for your parents. This could be connected to the Internet through an entry-level wireless router on the network-Internet edge and a modest Internet plan. You may gain best value with an Internet service provided by the Internet arm of the retail telephony carrier that they use. The email should be provided through an entry-level desktop client like Windows Live Mail, Mozilla Thunderbird or Apple Mail in conjunction with the POP3 / IMAP email system provided by the ISP.

If they like to be able to type mementos and similar things, you could deploy OpenOffice, Apple iWork (Mac OS X) or Microsoft Office Home And Student Edition (Windows, MacOS X). These suites can give you an adequate word processor, spreadsheet and presentation creator for a cheap price.

You may have to pre-configure the computer to suit the Internet service and email arrangements that your parents use, and may have to set them up for Skype. As well, you will have to teach them how to use the computer for these basic tasks and, perhaps, point them to services run by the local council or other community groups to help with computer familiarisation.

You might consider buying Mum one of those “tablet” computing devices like the Apple iPad, but most of these devices may be very expensive and some of them may lock you in to their platform tightly. For example, you may have to pay dearly if you want to use a keyboard. Another more affordable alternative may be to get a “convertible” notebook which has the screen on a “swivel” head and the screen is able to work as a touch screen or as a stylus-operated tablet screen. This can cater for people who still can type but like the idea of the touchscreen.


Once you know how to go about choosing and setting up that consumer-electronics or IT-related high-value gift for Mum, you can be sure that she will enjoy using it fully for a long time.


This post will appear in March, to cater for UK and European readers who celebrate Mother’s Day in March; and again at the end of April to cater for US, Canadian, Australian and New Zealand readers who celebrate it on the first Sunday of May.

Send to Kindle

Product Review – MetaGeek inSSIDer Wireless Network Analyser

The program is a free download from the MetaGeek Website or other download directories like TuCOWS or CNet. There is another application from this same team that works with a 2.4GHz spectrum analyzer for use in determining interference on this band, but it comes at extra cost.

The installation routine didn’t take long when I installed it on a Dell Studio 15 laptop that was lent to me as a review sample. It could work with the standard Wi-Fi network card that came with this laptop and could therefore work with any Wi-Fi network adaptor that is used with the host computer.

The program provides a “dashboard” with three concurrent views:inssider-screen

  • a table which lists the Wi-Fi networks that the program can find with their SSID, BSSID (MAC address) and channel for each detected wireless network.
  • a signal-strength / time graph for all of the discovered Wi-Fi networks
  • a signal-strength / channel graph for all of the discovered Wi-Fi networks

As far as I am concerned, the highlight of this program is the signal-strength / channel graph which is useful for identifying channel clashes or blank channels that you can tune the wireless access point to.

One of the main limitations is that it doesn’t detect “extended service set” networks nor does it support detection of multi-SSID access points which become a wireless on-ramp for many networks.. This may be of concern when using this program to manage routers with “guest-network” functionality or managing hotspots. Another improvement that I would like to see would be to provide for network grouping by SSID or BSSID (MAC address) so you can identify “foreign” networks easily.This would then help in identifying rogue access points or “evil-twin” hotspots easily.

I would then determine it as being very useful for “tuning” a wireless access point or router so it can coexist with other Wi-Fi networks, either as part of setting one up or troubleshooting a network. I would also recommend it as an essential tool for hotspot owners who want to keep their hotspot networks operating in an optimum manner and providing good customer service. It can also work well in “smoking out” rogue access points or fake “evil-twin” hotspots.

Send to Kindle

SSD drives now available for IDE-based computers

News articles

Du SSD pour les “vieilles” bécanes | Le Journal du Geek (France – French language)

My comments

You may be keeping an older IDE-based computer going or have a computer which has one IDE bus but plenty of SATA connectors on the motherboard. Hey, you may think of adding a solid-state drive to this computer in order to benefit from high operating speeds and low energy consumption but the fact that the only vacant secondary-storage interface is IDE-based throws your plans haywire.

What Buffalo has now done is to provide an SSD which connects to the IDE bus on these computers. The main limitation with this is that they only come in a 2.5” chassis, which means that you may have to use a 2.5” mounting kit and adaptor plugs if the computer you plan to upgrade is your desktop rig. They have a 64Mb cache and come in capacities of 32Gb, 64Gb and 128Gb with a price list of USD$250, USD$360 and USD$630 respectively. This may be a steep premium to pay if you want that quicker boot time for your older computer.

In my opinion, I would place the 64Gb drive as a drop-in replacement for the system drive (operating system, program files) in a multi-drive computer while keeping the “data” drives as regular rotary drives. Here, this could lead to quick boots and application starts without much power being used. The 128Gb drive may be useful as a drop-in replacement for the hard drives in older laptops that have a fair bit of life in them so as to keep them running longer on their batteries.

Send to Kindle

More rural broadband activity in the UK – Lyddington, Leicestershire

News article

thinkbroadband :: Fibre optic broadband in rural areas: Lyddington

From the horse’s mouth

Rutland Telecom – Web site

My comments on this topic

The main thing that impressed me about this news was that a small local operator took up the gauntlet to establish a backhaul and next-generation Internet service for a rural village in England. It’s so easy to expect the big-time companies like the incumbent or competing telecommunications firms or established ISPs to provide this kind of service, but a small firm has decided to lay the groundwork with its fibre-to-the-cabinet operation for Lyddington and the surrounding villages.

There is an expectation for a service with 48Mbps maximum / 25Mbps average headline speed for this network, which was similar to what would be expected for most suburban next-generation broadband rollouts. It will be based on FTTC (fibre-to-the-cabinet) technology with the copper run to the customer’s door being based on VDSL2 technology. This technology has a greater throughput than  the commonly-deployed ADSL2+ but is designed for short copper runs. Here, it will be installed as a sub-loop unbundled setup where the street cabinet exists between the main telephone exchange and the customer’s telephone.

This deployment was considered feasible for environments where the service would facilitate a full takeup of 40-50 customers in a not-so-dense area.

The prices averaged around GBP30 / month including line rental and 600 minutes of calls to any landline in the UK. The hardware would be part of the installation cost and included a VDSL modem and a broadband router that isn’t wireless. It would be the time to look towards choosing a wireless broadband router of the kind that works with cable Internet for this setup if you want the wireless home network. A wireless router would cost GBP45 extra if you bought it from them.

Location issues

There are still a few questions that need to be asked concerning the Lyddington FTTC rollout and would affect next-generation broadband efforts in rural Britain. One is whether and how the larger properties like the farms would be covered by the next-generation broadband efforts? Could this mean that a street cabinet has to be deployed near a cluster of farm gates with longer VDSL2 runs?

Similarly, there could be a classic estate with a large manor house or similar building and smaller houses scattered further afield on the same property. Some of these estates may have the manor house occupied by the appropriate aristocrat or the manor house may be a National Trust museum or upscale boutique hotel. Here, there may be issues with making sure each lodging on the estate has access to the next-generation broadband, and there could be issues with whether to locate the FTTC street cabinet in these estates and where they should be located, especially to make sure that “His Lordship” in the manor has very good bandwidth.

Equipment issues

Another issue worth raising is whether the VDSL2 modems will be made available without a router so that customers can purchase their own wireless broadband router from a preferred retailer. One reason is that an increasing number of manufacturers may supply “future-proof” dual-WAN home-network routers that have a built-in ADSL2 modem as well as a Gigabit Ethernet port on the broadband side. The other reason is that people who know the ins and outs of Internet and home networking may know the best broadband router for their needs and may find the supplied unit not suiting their needs and just another box in their junk box.


At least a small company who has the country at its heart is making real efforts to provide next-generation Internet to the British countryside and could open the floodgates towards competitive rollout of such technology to this class of people.

I am not a paid spokesman for Rutland Telecom but, as I have said before in this blog, I do stand for the idea that people who live or work in the country don’t deserve second-class Internet service.  Therefore I applaud those efforts that are taking place to improve the Internet-access lot for these users.


If anyone is living in Denby Dale – the “Pie Village”, in West Yorkshire, Rutland Telecom are inviting people to register for next-generation broadband in this village and neighbouring villages. They need a target of at least 450 households and small businesses in this area to make their next FTTC project for this town come to fruition.

The registration form for this campaign is at the Rutland Telecom Website.

Send to Kindle

What is happening to the common household telephone nowadays?

What was the common household telephone?

The household telephone became common during the years of prosperity that occurred after World War II ended and technology made it affordable for most householders to have a telephone service. This was a telephone handset that was installed in a common area of the house like a kitchen, hall, main lounge room or dining room. This phone, which was initially black, was allocated a number by the monopoly telephone provider and family, friends, employers and neighbours of any of the household’s members knew this number to contact the household’s members. These same members could place calls from that phone or receive calls on it whenever anybody who knew the number rang in. Sometimes it was seen as part of the wedding celebrations for a married couple to list their names in the standard telephone directory as “<husband’s first name> & <wife’s first name> <surname>”.

Using the common household phone

Using a common household telephone in the kitchen

There wasn’t the expectation of privacy from other members of the household during a phone call and, in a lot of cases, whenever the phone rang, members of the household would be “on edge” if the call was for them or not and whether the call had anything to do with them or not. If the intended call recipient wasn’t available, it was the job of whoever answered the phone to write down any messages that the caller may leave and, in some cases, call out those messages to the intended recipient. Typically this involved making sure there was a notepad or message book and a working pen near the phone and there were may occasions where there would be frustration due to the pen that was meant to be near the phone going missing. This has led to companies manufacturing pens that are tethered to a holder that is attached to the phone.

There used to be the option of having extra phone sockets installed around a house so you could move the phone amongst particular locations. On the other hand, some households installed an extra phone in the master bedroom, home office or similar locations so they could make or take calls from these locations. One person whom I know who used to run a dairy had 4 or 5 phones with three in the main living area, one in the office and another in the bedroom so he could take milk orders as soon as possible.

The cordless phone, which became popular through the 1980s and the 1990s, had changed the dynamics of the common household telephone and had allowed for some privacy and for handling calls in one’s preferred location.

This was the way with telephony for everyone until the 1990s when the mobile phone became affordable for most people due to competing service providers, subsidised handsets and prepaid mobile services. Similarly, there are many households with two or more lines where another of the lines is used as a household member’s private line because of the cost of telephone service going downhill.

What is now happening with the common household telephone

The mobile phone has made the common household telephone less relevant for engaging in personally-sensitive calls because the person can give out their own mobile phone number for such calls and can take these calls in their bedroom or outside with their mobile phone. Therefore these phones just end up being used for calls where there aren’t any privacy expectations.

In some households, especially share-houses with many young people, there isn’t a common household telephone installed. Instead, the phone line is used primarily for Internet access or other data-based activity. In other households, the common household telephone is simply seen by adults and teenagers as a failover line or a “call-anyone” line for that household.

The reduced traffic on these lines due to the mobile phone and VoIP-based low-cost-calling services has made the telecommunications companies (telcos), especially incumbent telcos who traditionally provided this service, worried because of the loss of call revenue that these lines yield. Some of these companies who run Internet or mobile services make up for this loss through the revenue derived from these services, but they have to maintain the infrastructure that is part of this elementary phone service.

The arrival of the sophisticated multi-function telephone

Now electronics manufacturers and telcos are developing implementations of the sophisticated multifunction home telephone. These are Internet-connected telephone devices which have a regular phone handset or cordless phone unit, but have a large colour touchscreen for many different purposes. Examples of these include Telstra’s “T-Hub” cordless phone with touchscreen base and the DSP Group’s Android-driven Wi-Fi cordless phone that looks like a smartphone.

Telstra T-Hub cordless multifunction telephone

Telstra T-Hub cordless multifunction telephone

The main driver behind the arrival of these terminals is the arrival of “single-pipe triple-play” fixed-location communications services which encompass Internet, landline telephony and multichannel television. These phones are being pitched as a more-sophisticated alternative to connecting a regular telephone to the Internet gateway device and using that device’s analogue telephony adaptor as the VoIP on-ramp.

These phones are able to work as a landline SMS terminal, email terminal and gateway to the popular social-networking Websites. A lot of them will have a general Web browser that works in a similar manner to how one browses the Web on a smartphone. Some of them will be able to play streamed or downloaded audio and video material with the sound coming out of a speaker that would normally be used for speakerphone applications; and the vision appearing on the phone’s touchscreen. It may also include the ability to use content held on local storage or network storage. These features are being used as a justification for replacing the phone that was placed in the kitchen or other common area because of their relevance to that area.

The phones that are part of a VoIP-based setup will also offer functionality not dissimilar to that of a business phone system with such call-handling functions like call transfer and park, conference calling, free intercom calling and the like. Some operators who sell the classic switched-circuit phone services will also offer hybrid VoIP-switched-circuit services with VoIP providing extra sophisticated functionality and a switched-circuit as a fallback.

Individualised communications

Another trend that is shaping the role of the common household telephone is the concept of individualised communications. This has started off with mobile telephones and businesses signing up to “direct-inward-dial” numbers for their staff members, but is now being made real with VoIP-based landline telephony services. It was also augmented with the idea of locale and device-independent “personal” telephone numbers being made available to people.

Here, a VoIP-based landline telephony system could allow users to determine which phone will ring and in what way (tone or cadence) if a particular personal number is called. This may be achieved through an interactive “log-on” routine that the user performs when they want to use that phone. It may also allow for individualised call accounting including the concept of “own telephone account”, which may be useful for households with teenagers, lodgers or small businesses.

In the same context, users who already maintain their own mobile phones could annexe these phones in to a VoIP-based landline telephone system that supports individualised communications and elect to make or take calls from the system’s phones or their mobile phone with connection-appropriate charging taking place to their account.

Action being taken to standardise these concepts

The Home Gateway Initiative is a trade group who are establishing reference standards for network hardware for the home and small business. They have established a reference standard for home network gateway devices like the routers, but more so the Internet gateway devices that have integrated VoIP functionality. They have also looked at the device setup scenarios where there are external modems like most cable Internet setups, but will encompass next-generation Internet setups. They are working on reference standards for VoIP telephony and could end up determining such standards for the multi-function telephones.


If these companies can look at ways of extending value out of the common household telephone by integrating it in today’s online world, they could stand a chance at seeing it more than just a communications device for the sidelined communities.

Send to Kindle

More reviews coming soon

I am going to add a good run of reviews to this blog, including two multimedia laptops, a consumer-level multifunction printer and some software. This may help with building this blog as a good-quality buying guide.

Send to Kindle

Competitive FTTH fibre-optic deployment in multi-unit developments

ARCEP white paper for people in multi-unit developments (French language)

ARCEP had established a regulation where if a telecommunications operator provides fibre-optic infrastructure in a multi-unit building, this infrastructure must be available to competing operators. This means that each unit owner / tenant must be able to choose whoever provides their super-fast broadband service and avoids the building owner or body corporate determining who provides that service to that building through exclusive “cosy” deals.

Two different methods


Each operator runs their fibre-optic infrastructure to a wiring closet where there is a fibre-optic switch that is programmed to run the operator’s service to the customers in that building. Each unit has one fibre-optic connection to that fibre-optic switch.

The service routing would be based on a VLAN or similar setup affecting the main fibre-optic infrastructure in the building. Operators would then have to make sure that the fibre-optic switch is programmed to pass service from their customers’ units to their street-based backbone.

The main advantage of this setup is that there is only one fibre-optic cable needed to be laid to each unit, thus allowing for reduced costs and infrastructure complexity. On the other hand, each operator will have to have access to the fibre-optic switch to make sure they can manage their services.


Each operator has their own fibre-optic infrastructure to each of the units, where there is a multi-entry socket for the customer-premises equipment. If a customer wants a particular service, the provider then visits the customer’s unit and connects the fibre for their service to the socket.

If a site can allow two or more optical-network sockets, two or more operators could be terminated in a socket for each of the operators. This may appeal to “geeks” or business customers who want to establish multi-WAN setups for reasons like bandwidth aggregation, load-balancing or fault-tolerance.

The main advantage for operators is that they have control and responsibility of their infrastructure to the customer’s unit, but each service change may require a field visit from the operator’s service staff. Similarly, there would be the issue of complicated infrastructure runs existing in the building, which may affect further infrastructure deployment.

Opportunities and Questions

A major opportunity that may exist for operators who are running optical fibre through a multi-unit building would be to use the cable as a wireline backbone for a cellular base station installed on the roof. This may be relevant to buildings with nine or more storeys and / or operators that run their own mobile telephone or wireless broadband service.

A primary question that may need to be answered is that if a group of broadband service providers share the same infrastructure run, usually as a cost-saving measure or easier entry point for new operators, would they have to create new fibre-optic runs to each unit in a multi-fibre setup or could they continue to share the same infrastructure to the unit’s door.

Another main question concerning the provision of IP-based infrastructure like the fibre-optic infrastructure in multi-unit buildings is how to cater for “all-unit” Internet services. This could range from a Web site with information for all of the units through unit-occupier access to vision from IP-based video-surveillance systems to multi-SSID Wi-Fi access points in common areas with each SSID linking to the home network in each unit. Issues that may have to be answered include VLAN establishment and / or use of anciliary DNS servers that cover only the services that are provisioned in the building and these setups may end up appearing to be complex to anybody that doesn’t have much computing experience.


What is happening with the fibre-optic next-gen broadband services in France, where there is likely to be lively competition, is worth observing, especially for all classes of multi-unit developments, whether all units exist in one building or in many buildings on one piece of land.

The white papers and other material on this topic at the ARCEP web site may then be worth reading by other communications regulators, building authorities, ISPs, building / development owners and management committees.

Send to Kindle

Comprendre l’écrans «Choix de Navigateur» – Mis à jour

Articles du Presse

Microsoft offre un choix navigateur Web pour les utilisateurs d’IE | BBC Technology (Royanne-Uni – Anglais)

Microsoft s’apprête à offrir aux utilisateurs de Windows un écran de choix du navigateur | The Guardian Technology Blog (Royanne-Uni – Anglais)

La concurrence entre navigateurs web relancée en Europe | DegroupNews (France)

De la bouche du cheval

Le navigateur de choix d’écrans pour l’Europe: à quoi s’attendre, quand l’attendre | Microsoft sur les enjeux (Microsoft – Anglais)

MIS À JOUR: Le navigateur de choix d’écrans pour l’Europe – Les enjeux de Microsoft (Microsoft – Anglais)

Union européenne communiqué de presse sur l’écran Choix du navigateur

Le raccourci d’écran de choix des navigateurs (disponible partout dans le monde)

 Site de plaidoyer (Mozilla)

Mes commentaires et informations complémentaires

Si vous exécutez une version de Windows XP, Vista ou 7 que vous avez achetés en Europe et votre navigateur par défaut est Internet Explorer 8, vous mai être tenus de remplir un navigateur “sélection” écran scrutin, connu sous l’écran “Choix du navigateur”, afin de déterminer dont le navigateur de votre ordinateur doit exécuter comme navigateur par défaut. Mai il ne se produira pas si vous avez exécuté un autre navigateur comme navigateur par défaut, puis revient à Internet Explorer 8. Il a également qu’il adviendra de migrants européens qui ont apporté leurs ordinateurs de Windows avec eux.

Vous aurez à travailler à travers un “assistant” qui a un écran d’introduction, puis la liste des navigateurs présentés dans un ordre aléatoire.  Donc quand vous choisissez ce navigateur, il sera déterminé comme votre par défaut l’outil de navigation Web chaque fois que vous passez à une page Web. Si le navigateur n’est pas installé sur votre ordinateur, le logiciel va être téléchargé depuis le site du développeur et installés sur votre système.

Si vous exécutez Windows 7, Internet Explorer «e» logo disparaît de la barre des tâches, mais vous pouvez toujours le trouver dans votre menu Démarrer. Ensuite, vous serez en mesure de le rattacher à votre barre des tâches en cliquant droit sur le programme dans le menu Démarrer et en sélectionnant “Pin à la barre des tâches”.

L’écran “Choix du navigateur” deviendra par la suite disponible comme une autre méthode pour changer les navigateurs par défaut, à côté des options disponibles lorsque vous installez, mettez à jour ou de lancer un navigateur Web.

Il ya certaines questions que vous exécutez en mai si vous passez de Internet Explorer 8 à un autre navigateur.L’une est que vous n’aurez pas vos flux RSS qui s’est tenue à la liste de flux commun qui fonctionne en tant que partie de Windows Vista et 7.  Cette mai affecter l’ajout d’aliments nouveaux destinés à des logiciels qui font usage de la liste de flux commun que leur magasin de données RSS.  De même, Windows 7 utilisateurs ne bénéficieront pas d’avoir les onglets visibles dans plusieurs fenêtre d’aperçu «Aero Peek». Cette question mai être résolu avec les versions des navigateurs alternatifs en cours de construction à travailler étroitement avec des caractéristiques de l’hôte système d’exploitation, qui peut être réalisé avec la programmation d’application Windows informations sur les interfaces mises à disposition par Microsoft.

À l’heure actuelle, il n’est pas un programme qui ajoute des navigateurs installés dans le menu contextuel lorsque vous cliquez-droit sur un lien Web.  Un tel programme pourrait bénéficier les développeurs Web et des blogueurs qui veulent tester une page sous différents navigateurs ou les personnes qui veulent «répandre la Web-charge de la visualization» parmi les différents clients.

Recommandations d’Auteur (sans ordre particulier)

Je recommande aucun de ces navigateurs car les utilisateurs n’ont pas besoin de réapprendre l’interface utilisateur si elles basculer entre aucun d’eux.

Mozilla Firefox

Internet Explorer



Send to Kindle