Understanding the new Thunderbolt peripheral-connection technology

Another of the new technologies that Intel has been promoting alongside its “Sandy Bridge” processor architecture has been the “Thunderbolt” peripheral connector.

Capabilities

This connector has a current raw transfer speed of 10Gbps but could have a theoretical maximum is 40Gbps (20Gbps up and 20Gbps down) when both pairs of wires are used. You can use this same “pipe” to pass a DisplayPort-based audio-video stream for a display as well as PCI-Express-based data stream.

There is the ability to daisy-chain 7 Thunderbolt-connected devices but you can have less than 3 metres between the devices at the moment.

Thunderbolt at the moment

This technology will complement USB and other connection technologies but will be like what happened with USB in the mid-90s. This means that it will be an Apple-only technology and this will appear on the latest run of MacBook Pro laptops.

It will appear on PC-based computers in early next year. As far as retrofit opportunities go, Intel had mentioned that it could be available for new motherboards but there was nothing much said about availability as an add-in expansion card.

The main peripheral applications would be external storage subsystems like the LaCie “Little Big Disk” storage array; as well as displays. Such peripherals that have this connection will typically be marketed as being “Thunderbolt-ready”.

What could it offer

Another storage-expansion connection for computing devices

One key application would be to provide a high-bandwidth direct connection between computer devices and one or more external hard-disk storage subsystems. The reason I use the term “computer devices” is because such devices could encompass PVRs which could benefit from capacity expansion, routers and network devices that convert attached external hard-disk subsystems to network-attached storage; as well as the general-purpose computers.

Multifunction devices that are fit for the new generation of compact high-performance computers

There is the possibility for one to exploit the Thunderbolt concept to design a multifunction desktop console unit. Here, this unit could house a screen, audio subsystem, video camera, removable storage such as an optical drive or SDXC card reader and/or a USB hub. Another variant could house a keyboard instead of a screen and connect to one or more external displays using DisplayPort or regular monitor connectors.

This display unit would be connected to an ultracompact system unit that has only the processor, RAM, graphics-processor, network connectivity and a hard disk, plus some USB sockets for a desktop application. On the other hand, this display could serve as a “desktop display” for a subnotebook or ultraportable computer. The USB hub would come in handy for connecting keyboards, mice, USB memory keys and similar devices.

Here, these multifunction devices can be designed so that they are no “second-class citizen” because they have multiple functions. This means they could render the multiple video streams as well as support the high-capacity removable storage technologies like Blu-Ray Disc or SDXC cards.

This is more so as the Intel Sandy Bridge technology makes it feasible for small computers like book-sized ultracompact desktops and notebooks of the “subnotebook” or “ultraportable” class to “have all the fruit” as far as performance goes.

Issues that may be of concern

One main issue that I would have about the Thunderbolt technology is that Intel could limit it to computer applications that are centred around its chipsets. This would make it harder for competing processor designers like AMD or NVidia to implement the technology in their chipset designs. It would also place the same implementation limits on system designers who want to use chipsets that offer improved performance or better value for money alongside Intel processors on their motherboards.

This is like the Intel Wireless Display technology which allows a special display adaptor to connect to an Intel-based laptop computer via a WiFi wireless network and show the pictures on the attached display device. Here, this functionality could only work with computers that have certain Intel chipsets and couldn’t be retroactively applied to older computers.

Another issue would be to encourage implementation in “embedded” and dedicated-purpuse devices like PVRs and routers as well as the general-purpose computers. For some applications like the previously-mentioned storage-expansion application, this could add value and longer service life to these devices.

Conclusion

Once the Thunderbolt technology is implemented in a competitive manner, it could open up a new class of devices and applications for the computing world by making proper use of the “big fat pipe” that it offers.

The printer-initiated scan-to-computer feature for network applications could be standardised and implemented at operating-system level

Most, if not all of the network-capable all-in-one printers that I have reviewed on this site have support for network-based scanning. This includes the ability to start a scan job from the printer’s control surface and have the job sent to the computer and handled in a preferred way. But this function isn’t handled in a smooth and reliable manner as judging from my experience when connecting the many different printers to my computer.

The current situation

This function is typically managed by a manufacturer-supplied “scan-monitor” program that is part of the “printer solutions package” and has to be up and running before you start your scan job from the device.

What can typically happen is that this functionality can end up being dependent on the way this “scan-monitor” program behaves. Here, you may end up not being able to scan via the network or not being able to start the scan job at the printer’s control surface. In some cases, you may be able to use the operating system’s scanning infrastructure such as Windows Image Acquisition, rather than the manufacturer’s scan tools to do a scan job,

Why integrate device-initiated scanning for networked hardware in to the operating system

The operating systems could support device-initiated scanning by offering functionality like “scan paths” that are available to each of the devices. Here, the devices could then expose the “scan paths” that are available to them based on their capabilities like colour scanning, automatic document feeder, etc. This means that if two scanners have the same capabilities, they have the same scan pathos for each computer endpoint.

Multiple-machine environments

This could include the ability to identify a particular computer as a destination for the scanned files; as well as allowing applications rather than the manufacturer’s particular applications to be the endpoints. This could allow for applications like OCR, bookkeeping, raster-to-vector and others to simply become “available” at the printer’s control panel rather than having to work the application’s user interface or find image files left by the scan monitor in order to benefit from the scanned work.

Here, it may cater for realities associated with the home or small-business network where there are many computers and, in some cases, two or more multifunction printers. This may be brought on by the use of a premium-level machine with all the bells and whistles like the HP Photosmart Premium Fax C410a or the Canon PiXMA MX-870 being installed in the home office and an economy-level machine like the HP B110a Wireless-E installed in the study, kitchen or bungalow and used as a “second” printer.

Efficient operation

Another obvious benefit of the scan-monitor function being integrated in the operating system is that it works in an efficient manner. This will free up memory and other resources and allow for a quick response from the destination computer. This is compared to a significant time delay occurring when one instigates a scan job from the multifunction printer’s control surface as the scan monitor starts up and handles the scan job.

Points of innovation

The operating system working as a scan monitor can open up paths of innovation when it comes to imaging-driven applications. An example of this could include the use of the multifunction printer’s control surface for entering job-specific information. This is more so as these multifunction printers come equipped with D-pad, numeric keypads and touchscreens; as well as graphical screens and menu-driven operation. Applications of this could include entering the file name for “scan-to-file” operations, determining the nature and amount of an expense when scanning receipts in to a bookkeeping program or entering photograph-specific information when scanning a photograph.

It can also open up another path of innovation in having network-attached-storage devices become scan destinations without the need to remember FTP or other file-path locations for these devices. This can help with activities like archiving of paper documents or scanning of pictures to be made available on the DLNA Home Media Network.

Conclusion

Once we move the workload of device-initiated scanning to the Windows, Macintosh or Linux operating system, it can then yield many improvements to people who scan hard-copy material using the current crop of multifunction printers.

Feature Article – Basic information about provisioning public Wi-Fi hotspot service

Introduction

You might be considering setting up that complimentary hotspot for your guests to use but there are certain risks to be aware of concerning the security of your business and your guests’ data and identity.

Risks that have been highlighted include confidential-data and identity theft performed against customers as they work this data from their portable devices; as well as clandestine computer activity like the downloading or serving of illegal content; or the distribution of spam email, performed using computers connected to public Internet networks like wireless hotspots.

As well, there may be other imperatives required of people who provide Internet access to the public. These imperatives, asked for by various local, state / regional or national governments may include requirement like keeping a log of whom you provide Internet access to or requirement for session tracking. Therefore I am not therefore in a position to explain how to satisfy these needs and it is best to seek local advice on this topic.

Therefore, your business should know who is using the hotspot service and be able to make sure that the people who benefit are the business’s customers or guests. This means that the customers or guests are actually going to be operating the network device that they use when connecting to the service and also operate it on your premises. As well, your customers know that they are going to actually benefit from your hotspot service when they log in to this service.

The cafe or bar as a “second office”

This is more important for the cafe as an increasing number of businesspeople use these places as “second offices” where they can work without unnecessary office-borne distraction or as places where they meet their colleagues or business partners. Here, these people will be working on workplace-confidential data and most of these workplaces place high value on the security of this data as it travels between the laptop and the workplace’s main computer systems.

In fact, the reason I have decided to publish this article was because a cafe that I regularly visit in Camberwell (Melbourne, Australia) had just started to offer free public Wi-Fi access but I had wanted them to provide a free Wi-Fi service that is safe for their customers. Here, they had an ordinary wireless router as the Internet service but they needed help in getting this service working properly and safely. They also wanted to make sure that this resource was available just to their customers as part of their customer service.

Your equipment

When you start out with your complimentary-use hotspot service, you may use a wireless router hooked up to a separate Internet service or use one with a “guest-access” or hotspot function and is connected to your common Internet service.

This should be set up to cover your public area such as the bar areas in your bar or the dining room in your cafe. In some situations, you may need to use an additional access point to cover larger areas or get your signal past thick walls. This is something I have covered in this site as a separate article.

As well, if your equipment works on 802.11n technology, it should be set to work in compatibility mode where it can work with 802.11g and 802.11n devices. This is to cater for the fact that most devices that are in circulation, especially smartphones, are likely to work with 802.11g technology and people may operate battery-operated 802,11n-capable devices in 802.11g mode in order to conserve battery runtime.

Dual-band setups

It may be an asset to consider a dual-band setup for your wireless hotspot. This will use a radio presence on the 2.4GHz band as well as the newer 5GHz band and is supported by an increasing number of newer laptops, tablets and smartphones. The new waveband comes in to its own for multimedia applications like video conferencing or photo and video uploads to social media as well as taking some pressure off the 2.4GHz band for legacy equipment to use.

This can be achieved with a router / gateway or access point that implements simultaneous dual-band operation or you can add a 5GHz access point or a dual-band access point set up for 5GHz operation to your existing network.

Here, you need to make sure you still have your network set up for 802.11b/g/n operation for the 2.4GHz band and 802.11n operation for the 5GHz band. If your equipment supports 802.11ac Wi-Fi, you may have to make sure that the 5GHz aspect works in a compatibility mode for both 802.11n and 802.11ac equipment. As for the SSID (Network Name) which is talked about below, you can use the same SSID for both bands and the clients’ computer equipment switches between the bands automatically.

Your SSID or Network Name

The SSID or network name is very important to your hotspot’s identity. Here, it should reflect your business’s name and have a reference to public or guest Wi-Fi service. An example that I used for a basic complimentary-use Wi-Fi hotspot that I set up at a coffee lounge just recently was MORAVIA-PUBLIC-WIFI. Here this reflected the coffee lounge’s name (MORAVIA) as well as stating that the service was a public Wi-Fi hotspot service hosted by this business. Therefore, you can then identify any “evil-twin” or “fake-hotspot” devices left on or near the premises that exist to capture customers’ sensitive data.

This SSID must be used in all signage advertising your hotspot and the signage must reflect your company’s identity. This means that it either has your company logo and name or be in your company’s styling. In this case, the signage about the hotspot should at least exist beside the cash-register and the door, preferably at eye-level or near the main handle or pull.

Hotspot security

Basic security

Your hotspot network should be secured with a WPA-PSK passcode which your staff should give out to customers who want to use hotspot service. As well, the network should have wireless-client isolation enabled, so that customers who are using the hotspot cannot browse on to each others’ computers.

Previously, there wasn’t any wisdom in implementing link security on a public-use wireless network but now that most computers and handheld devices support WPA-based link security for wireless networks, adding this function to WPA-level is still worth it for achieving some control and security in a public-use wireless network.

It is still important to change the WPA-PSK passphrase regularly such as at least twice a month. Some environments may require the passphrase to the changed every week. This is so that it becomes hard to set up a “fake hotspot” using your service’s credentials or keep a computer logged in to the hotspot service without you knowing.

People who use “open-frame” computing devices based on recent versions of Android or Windows may find that this job may be simplified. One method, which works with both the operating systems, is to use WPS push-button setup on consumer routers that are suitably equipped and are serving as dedicated hotspot devices. But another method is to make a QR code representing the SSID and WPA passcode as a machine-readable form and print this out on to a card that you hand to your customer. Then they scan this code with their Android or Windows 10 device with the appropriate reader software.

As well, your hotspot should properly support VPN pass-through for all protocols so that business users can log in to their workplace VPNs  without any headache.

Special hotspot-gateway devices

It may be worth knowing that if you want greater control over your public Internet service, it may be worth implementing a “docket-printer-based” wireless hotspot gateway like the Netcomm HS-1100, Solwise WAS-105R or Zyxel N4100.

Here, these devices direct users to a login page where they have to key in a session login and password that they transcribe from a paper docket that is printed from a docket printer attached to the hotspot gateway. If you intend to offer a paid service, these devices put you in a position to use the payment methods and paths that you use to accept payment for your goods and services.

This is unlike some other hotspot gateway setups that require the potential user to pay another company directly using their credit card or an account maintained by that other company using a payment form hosted by that hotspot. Typically, a lot of these setups are managed in a manner where you don’t have much control over how the service in provided and the service may be provided in a manner not dissimilar to how most vending and amusement machines are provided where you don’t own the equipment, representatives visit the premises to maintain the equipment and you get a small “cut” from the takings.

As well, the session login parameters that your users type in from these dockets exist only for a particular time limit. This is also important for people who run a paid service, but can be useful for managing complimentary service so you can be sure that the people who are using your service are your customers or guests who are in your public areas.

If you do run one of these dedicated hotspot gateway devices, such as a “docket-printer-based” device, the wireless network that these devices operate should still have WPA-PSK security with the passphrase changed regularly. The “docket-based” devices will list the WPA-PSK passphrase on that same docket so your customers can still log in to your hotspot from their device.

Hotspot 2.0 / Wi-Fi Passpoint functionality

Hotspot-gateway devices that supports Hotspot 2.0 or Wi-Fi Passpoint operation, including firmware updates that bring this functionality to existing equipment, is also worth its salt. This provides for improved login experiences including the ability to have your venue described in the list of available Wi-Fi networks when your customers use compatible along with a simplified signup or login procedure. It also supports link-level security between the user’s computer or phone and the access point.

When you enable Hotspot 2.0 or Passpoint functionality on your hotspot gateway device, make sure that your establishment’s details are properly entered when you fill out the setup form for this function. Here, if your users have equipment that supports this technology to the letter, they can identify your establishment in a more qualified manner so they are sure that the Wi-Fi service they are connecting to is the one you are providing at your business.

Of course those of us who use devices that don’t support this functionality can still benefit from Wi-Fi hotspot service on these services as long as “universal” authentication is enabled on the gateway device.

Branding options

If you do implement these devices, make sure that you know how to brand the customer-facing user interfaces.

Most of these devices can allow you to upload a graphic and integrate it in to the login interface or they can allow you to upload customised login screens or point to a Web server for the login interface graphics. The latter option may appeal to you if you have a good hand with creating basic HTML Web pages.

Here, make sure that you have your business name and logo and, if you can do it, set the colour scheme to your business’s colour scheme. As well, make sure that your business name appears on the access dockets that your hotspot gateway prints out.

Power outlets

With a hotspot, always expect that some of your customers will use the power outlets on your premises to power their laptops or smartphones from AC power to avoid compromising battery runtime. This is more so with customers are operating older equipment that has batteries that are “on their last legs” or are working VPN sessions in order to “pick up” files from work and want to be sure this is done properly.

Here, a few double outlets near the tables can work wonders here and if an outlet is used for powering a device like a lamp, the device could be connected to the outlet via a multi-socket power-board with extra outlet space for a few appliances.

Conclusion

Once you know how to choose and set up your public-use wireless network properly, you can make sure that this is a service that your customers and guests will benefit from fully. This may even put your business “on the map” as far as customer-service extras are concerned.

UPDATES

I have done some revisions to this article which was originally published in August 2011 to reflect the arrival of newer technologies like 802.11ac dual-band Wi-Fi wireless technology, Wi-Fi network credentials via QR codes, and Wi-Fi Passpoint technology.

What about having IMAP4 as a standard email protocol

Introduction

Most email services, especially those offered by consumer ISPs, use the old POP3 / SMTP protocols as the backbone for their email services. This works properly when only one computer is working as an email client because there is an expectation for the email to be downloaded off the mail server to that one computer.

Now the reality has changed due to Moore’s Law allowing for the ISP to offer email storage capacity to their customers in the order of gigabytes. As well, the computing paradigm has shifted towards people viewing their email from multiple devices. This has been brought about with small business owners having an office computer and a home computer, as well as the increasing popularity of smartphones, tablet computers and secondary-tier notebook computers like netbooks and 13”-14” ultraportables.

What does IMAP4 offer over POP3?

The IMAP4 technology requires email to be stored on the server and allows a copy of the mail to exist on the client devices. When the email client connects to the IMAP4 server, it simply synchronises all the email between the client and the server. This includes synchronising the client outbox to the server outbox in order to have emails being sent.

There is the ability for an IMAP4 setup to support “header-only” downloading, which would be of importance to people who use portable devices or low-bandwidth connections. As well, an IMAP4 setup can allow the user to operate in “offline” mode where synchronising is done when the user explicitly goes online so that users can prepare their email where Internet access is unavailable but synchronise when it is available.

Compared to POP3 / SMTP, this allows for increased flexibility when it comes to maintaining a mailbox from different email clients. Primarily, the contents of the same mailbox appear in all client devices that can access that mailbox. An example of this benefit would be that the Sent folder contains all messages that are sent from all of the clients rather than from that particular client. Similarly, one could “rough-out” an email using a smartphone or other portable device, then “finish it off” on the desktop because the email will be held in the Drafts mailbox folder.

It also supports the ability to create mailbox folders which will allow you to file the email in a manner that suits you, yet see the same filing arrangement across all your client devices.

It is also worth knowing that IMAP4 is the basic email protocol that OMTP have called as part of their standard for mobile “visual voicemail” services. These services allow a user to manage voicemail that they receive on their mobile phone in a similar manner to how they manage email on their computer or smartphone.

The status quo with IMAP4

IMAP4 is a free open-source technology that is independent of any licensing requirements; and nearly all email clients for desktop and mobile operating environments offer IMAP4 support as standard.

It is even though most of the consumer ISPs don’t offer it as an email protocol to their customers. This is while an increasing number of these providers are now offering mailboxes with gigabyte file capacities to new customers and upsizing existing customers’ mailboxes to these capacities. As well, the current range of data-centre equipment that works as mail servers can handle IMAP4 easily.

Some of these providers would rather offer a “hosted Exchange” service which would require the user to use Microsoft Outlook in Exchange mode. These services are more expensive to provide and may cost more for most personal and small-business users.

What could be done

An Internet service provider could offer IMAP4 mailboxes as a standard option for new customers or customers opening up new mailboxes. As well, they could offer it as a free upgrade option to existing customers, with information on how to convert from POP3 / SMTP to IMAP4.

This kind of setup that IMAP4 offers can allow telcos who offer Internet service and telephony as a bundle or triple-play services to provide a unified messaging environment where customers can manage their voicemail, fax and email from the same terminal. It also opens up ways for these companies to add value to their telephony and Internet services.

It also is a way of supporting the Internet-usage reality which is a reality driven by multiple-computer setups and portable computing.

At last a free iPhone app for controlling the UPnP AV / DLNA Home Media Network

Links

Bergin-IT Gizmoot

Direct link to iTunes App Store

My comments

This happens to be the latest DLNA controller program for the iPhone or iPod Touch and is available for free from the iTunes App Store. This program also is ad-supported through the iAd network that exists for iOS software. At the moment, it isn’t designed to work well with the iPad.

The functionality is basic in that it allows you to browse your media on a DLNA (UPnP AV) media server and have it play on a DLNA (UPnP AV) Media Renderer. This would be considered basic compared to the likes of PlugPlayer in that it wouldn’t allow you to play the media from the Media Server through the iPhone, nor would it support downloading or uploading between the Media Server and the iPhone’s local storage.

It can support playlists and slideshows so you can have your Samsung TV or WDTV Live run a sequence of media under the control of your iPhone.

I would still recommend this app for people who want to get going with UPnP AV / DLNA “three-box” setups and they have equipment that can be controlled through a UPnP AV / DLNA control point. This would be more so with network AV media adaptors which you want to press in to service for audio playback and you don’t necessarily need to have the TV on so you can select music to listen to. You may even think of using this program with that iPod Touch or iPhone 3GS that you have set aside because you have moved to the ultra-cool iPhone 4, so that the old phone can be part of the DLNA Home Media Network.

Product Review–Bang & Olufsen Form 2 headphones

Introduction

I am reviewing the Bang & Olufsen Form 2 headphones which are a very stylish set of premium lightweight headphones that are suitable for use with your portable media player, smartphone, or laptop. Here, these headphones are designed and made by a company that is one of a few “names of respect” when it comes to audio-equipment and speaker design. I have even raised this name in this site in connection with their involvement in designing the sound system for some of the ASUS premium laptops.

HP Envy alongside B&O headphones

HP Envy alongside some premium B&O headphones

Regular followers of this site may have noticed these headphones as a prop in a picture that I took of the HP Envy 15 laptop, where I was emphasising the “Black Label” positioning of this premium laptop.

These “over-the-head” headphones sell at B&O stores for $199 and if the earpads wear out, you can replace them for $10 a pair but I had received this pair from some close friends as a 40th birthday present. As you will read further, you will find that they are a real treat to use.

Look

Like with all B&O products, the style of these headphones is a very strong point. Here, there is a large black aluminium headband with the square earpads anchored to the headband by bands that look as though they are part of an elegant watch’s band.

Even the plug is designed to match the look and positioning of these headphones. Here, it is a small plug with gold-plated contacts which are known to provide the high-quality sound transfer.

Comfort

Bang & Olufsen Form 2 headphones

Bang & Olufsen Form 2 headphones

This has allowed for a snug comfortable fit on the user’s head with the earpads pressing in on the user’s ears. As well, they are not too heavy and will not fall off your head too readily unlike a lot of cheaper headphones.

Here, this allows for use of these headphones over a long time, yet you can still slide them aside if you need to talk to someone nearby while you are wearing them.

Sound quality

The real story with these headphones is in the sound quality, whether you are listening to music or audiobooks, watching movies, playing computer games or using them with a microphone adaptor for handling phone calls with your mobile phone, This has been based on B&O’s reputation in designing speakers and headphones that go with their stylish and luxurious hi-fi systems.

It is very much what you would expect from true hi-fi headphones. Here the sound was clear and tight and not boomy and it didn’t matter if the headphones were fed with music or sound effects from a movie or game. For voice applications, including telephone calls, the Form 2 excels on the voice clarity and could be suitable as part of a headset system for wideband telephony setups.

These headphones don’t have any noise-cancellation circuitry and are of the kind that sit on your ears. These factors may be a limitation with using them in noisy environments like aeroplanes, buses or diesel railcars but their snug fit reduces the noise impact from these environments slightly.

Bang & Olufsen Form 2 headphones - earpad and watchband styke bracket

Earpad and watchband-style bracket

Points of improvement

There aren’t really any points of improvement except for B&O to make a derivative headset that has an integrated microphone for use with smartphones and other telecommunications applications. This would be of importance when it comes to designing a headset fit to be used with HD Audio and other wideband telephony setups.

As well, they could provide a “travel-kit” as an accessory for these headphones and other headphones in their range. This would consist of an elegant storage case, an active noise-cancellation module and a “jet-plug” adaptor to connect these headphones to inflight-entertainment systems.

Conclusion

I would recommend these headphones if you value good-quality sound, style and comfort from a set of “over-the-head” headphones. Even if you can’t afford a set yourself, it may be worth wish-listing it as a gift for an upcoming major birthday or anniversary. As well, once you use them, your ears will certainly know the difference between good headphones and cheap headphones.

I would even say that these headphones are a good partner accessory for a premium laptop like the Acer Ferrari or the HP Envy laptops.

Moving towards inkjet technology for receipt printing–why couldn’t this be done

When most of us do business with banks or shops or simply run a business, we have to deal with paper receipts and journals. Typically this involves the use of a printer that prints on to a paper tape of some form, whether integrated in a cash-register, EFTPOS terminal or an automatic teller machine; or as a standalone device connected to a computer-based point-of-service system of some sort.

Similarly, this class of “tape printer” is also being put to use as a label printer in most business applications like travel or healthcare. But this label-printer application is becoming relevant in the general office space for addressing envelopes on an as-needed basis.

In the home, It may also be relevant as a coupon or receipt printer for interactive TV applications such as “claiming” special offers that are promoted alongside TV commercials or buying goods from TV shopping. It can also be relevant for “as-needed” label printing in the home office.

The main problem is that there are two main printing methods used with this class of printer. One is an impact printer that works like the old dot-matrix printers and uses a ribbon to print on to cheaper plain paper. The other is a direct-thermal printer which uses heat to print on to special paper, like the first-generation fax machines.

Usage problems

Both these technologies yield a fair share of problems with the useability of these dockets. The impact printer is based around a ribbon which can cause the print quality to deteriorate as the machine is being used. At worst, the docket or journal can end up being hard to read when the ribbon is nearly at the end of its life.

The thermal printer which relies on the special paper can cause problems of its own when it comes to handling the receipts or journals. For example, the paper is known to fade over time and this becomes worse with receipts that are kept in a wallet that rests in someone’s hip pocket because of the contact with one’s body heat. This can be an issue if you have to keep the receipts over a significant amount of time, which would be required of a business or individual in order to satisfy the taxman.

Another issue is that the paper can be very slippery and this can cause problems when writing on the receipt or journal with most ballpoint pens. This may be of importance if you have to sign a receipt at the point of sale when paying by credit card. As well, customers may have to sign or annotate the receipt after the sale for tax or reimbursement purposes.

It also makes it hard to use an automatic document feeder on a scanner, fax machine or copier with these documents if you have to copy, scan or fax them. In these situations, you are not likely to have consistent and reliable feed-through behaviour and at worst, you could have frequent paper jams.

Inkjet technology for this printer class

One improvement that I would like to see is for manufacturers to use inkjet technology for this class of printer. Here, the printer could use an integrated printhead cartridge like what most cheaper inkjet printers use or use technologies like the pipe-based ink-distribution technology used in Brother inkjet printers like the MFC-6490.

Previous designs

Canon has tried this idea previously with a few of its printing calculators by using a “BubbleJet” mechanism as the printhead but not many other manufacturers caught on to this idea.

What could it offer

A printer based on this technology would use cheaper plain-paper rolls for regular receipt and journal printing. If it were to print labels, it could use regular and cheaper plain-paper labels, rather than special thermal-paper labels.

The inkjet technology can also support colour printing in a cost-effective manner, whether as a basic two-colour setup or as a full-colour setup. This can open up application paths like colour emphasis or full brand preservation on customer-facing documents. In the home, it could appeal to personal “as-needed” labelling applications like “ownership” labels used for things like books and recorded music, or labels used on jars of homemade preserves where these labels convey full personal flair.

If the mechanism uses the pipe-based ink-distribution technology, it could use higher-capacity cartridges which would be useful for high-throughput applications like kiosks, gaming machines, high-turnover point-of-sale or ATMs.

Limitations

One limitation that may surface for this class of printer is the size of the inkjet print mechanism. The printhead for this technology may be larger than the common thermal printhead and this will impact on the design of the device that it is to be implemented in. This will put a limitation on designs that are intended to be low-profile like handheld payment-card terminals, printing calculators or peripheral printers, unless these machines use a pipe-based ink distribution mechanism.

It could be easy to “cheapen the design” by doing what has been commonly done with consumer and small-business inkjet printers. Here, a manufacturer could sell a low-end inkjet-based tape-printing device like a label printer, printing calculator or entry-level cash register for a loss-leading price but have the device work only with expensive ink cartridges. This can be exacerbated through the use of very small ink cartridges that need to be replaced frequently.

This may also require a cash register or POS printer to have two separate paper rolls placed side by side and the printhead moving across both rolls every time a sale is made. Some machines may be designed with dual printheads so they work as if they have two separate printers – one for the journal and one for the receipts.

Conclusion

The use of inkjet printing for “tape-based” printers could make life easier for most businesses and customers as well as allow for increased innovation in this class of device.

The arrival of 4G wireless broadband–what does it mean for Next Generation Broadband

Article

Telstra super-fast 4G wireless sparks debate over NBN

My comments

As many countries agressively build out fibre-optic-based “Next Generation Broadband”, there is also the reality that companies involved in wireless broadband will deploy LTE or WiMAX “4G” technologies for this service.

This issue has been raised recently as Telstra, Australia’s incumbent telephone and mobile carrier announced its intention to deploy LTE-based 4G wireless broadband. This is even though the Australian Federal Government were rolling out the National Broadband Network, which is the next-generation broadband service based primarily on “fibre-to-the-premises” technology.

A key issue that have been raised include the “all-wireless” household or small business, which doesn’t have a landline telephone or ADSL/cable-based broadband Internet for their telecommunications. This may be implemented by students and similar households where each user wants control over their communications costs as well as assuring proper service privacy.

Issues of comparison

Value of service as a primary Internet service

A common disadvantage with this kind of setup is that the bandwidth available to the user from a wireless broadband service is less than that for a wireline broadband service like ADSL, cable or fibre-optic. As well, the wireline service is typically able to offer better value service than the wireless service. This disadvantage may be eroded if the 4G wireless broadband services are priced aggressively against the Next-Generation-Broadband wireline services.

Reliability and Stability

Even so, the 4G wireless broadband setups won’t yield the same bandwidth as a next-generation broadband setup; and these systems are based on radio technology which can be affected by many factors such as  the environment surrounding the radio equipment, the aerial (antenna) that is used as part of the equipment and the calibre of the equipment itself.

Examples of this include wireless-broadband modems used in double-brick / cinder-block buildings; equipment like USB modem sticks designed to be compact therefore not having adequate aerial systems; and simple weather conditions that affect wireless performance.

Here, this could lead to inconsistent performance for 4G wireless-broadband setups, with results like stuttering during VoIP telephony or multimedia playback.

Multiple device setups

No-one has yet raised the issue of a person operating multiple devices that connect to wireless broadband Internet. This is a common reality as people buy smartphones, tablets and netbooks that have integrated wireless-broadband connectivity. Here, these devices are operated on their own services and it requires users to keep track of the many accounts and bandwidth allowances that each device has.

As well, the wireless-broadband technologies discourage the idea of establishing local-area networks which could permit bandwidth sharing / pooling or sharing of resources like printers or file directories. Here, the users would end up not creating a local area network at all, and may just end up using technologies

Political issues peculiar to the Australian scenario

I also see certain political issues in the “next-generation-broadband vs 4G wireless broadhand” issue more so in Australia. Here, the Australian Labour Party see the National Broadband Network as a tool for nationalising or “claiming back” the wireline telephony infrastructure that they relinquished when Telstra was privatised. Here, Telstra, like British Telecom was originally part of the government-owned “Posts, Telegraphs, Telephones” department and became its own telephony entity as this department was separated.

There hadn’t been any mentions of intent to nationalise the Telstra-owned wireless infrastructure used for reselling their mobile telephony and wireless-broadband service. As well, Telstra were wanting to set up the aforementioned 4G LTE wireless-broadband technology on this infrastructure as a retail service and the Australian Labour Party were seeing this wireless-broadband service as a broadband service that competes with their National Broadband Network.

How I would see this argument is a way of seeking legal authority to require Telstra to do a “BT-style” sell-off of its mobile-telephony and wireless-broadband business. This is where they would be forced to divest themselves of the infrastructure and retail mobile-telephony / wireless-broadband business to another service

Conclusion

How I see the role of any wireless-broadband technology is that it is a complementary technology to a wireline technology rather than a competing technology. It exists primarily for mobile, portable and temporary computing applications.

PS. If I am appearing to write this article in a manner that supports Telstra, I have no pecuniary interests in this telecommunications company other than to be a regular customer of its telephony services.

Product Review–Pure One Flow portable Internet radio (Frontier Internet Radio platform)

Introduction

I am reviewing the Pure One Flow portable Internet radio which is the younger brother of the Pure Evoke Flow radio that I have reviewed a while ago. This unit is designed along the same lines as the “old-style” portable radio that can be perched on a window sill or the top of a fridge.

Price

Recommended Retail Price: AUD$249

ChargePAK battery pack: AUD$99

Pure One Flow portable Internet radio

Functions

Analogue Radio FM RDS stereo
DAB+ Yes
Internet Radio vTuner (Pure Lounge portal)
Network Media DLNA media player

 

Connections

Input Count as for a device
Audio Line input 1 x 3.5mm phone jack
Output  
Headphone output 1 x 3.5mm phone jack
Network  
Wi-Fi 802.11g WPA
Ethernet Requires mini-USB Ethernet adaptor

 

Speakers

Output Power 2.5 Watts (RMS) 1 channel
Speaker Layout 1 3.5” full-range

 

The Internet radio

The Pure One Flow is the same size as a midsized portable radio and is housed in a rubberised cabinet with knobs for volume and “select” function and buttons below LCD display. The rubberised casing is a marked difference from the glossy plastic that is used on some radios, which attracts fingerprints and is hard to keep clean. I also like the knobs, especially for the sound volume because it is an interface most of us are accustomed to, where you can just “flick” the knob downwards to turn it down.

Like the Evoke Flow radio that I previously reviewed, this unit can work on AC using a supplied “wall-wart” power adaptor or battery power using a “ChargePAK” rechargeable battery pack that is available as an extra-cost option.

Pure One Flow portable Internet radio - side viewAudio connectivity is in the form of an auxiliary-in jack so you can use the radio as an amplified speaker for your MP3 player or other audio device. It also has a headphone jack which is a connection that I am noticing is becoming increasingly rare for Internet radios. The reason I find this connection important is that you could use an active-speaker system like a pair of computer speakers as better-sounding more-powerful speakers for the radio.

The set works well as a DAB-based digital radio, being able to pick up all of the multiplexes that are broadcast in our area.

For Internet-radio station selection, this unit uses a  “Form style” user interface if you intend to select a smaller group of stations but will give you the complete list of stations if you are just browsing. This is in contrast to the “tree-based” approach that most Internet radios use for selecting stations.

There is also access to a “sounds” service where you can hear sounds like sea wave; as well as access to the “FlowSongs” music download service.

This radio works properly as a DLNA-compliant media player, being able to play most audio file types that are held on UPnP AV media servers.

The sound quality for this set is very similar to an average mid-sized portable radio such as the archetypal transistor radio of the 1960s. It can still fill an average-sized room with music and the sound is focused around the middle frequencies.

Limitations and Points of Improvement

This unit could be improved with the telescopic aerial being used for the Wi-Fi wireless network as well as for FM and DAB radio.  The Wi-Fi functionality could work well with keeping the details for up to five wireless networks, which can be useful if you take the radio between multiple locations, which is something you would be tempted to do more readily with this set.

Another limitation is that you can’t enable daylight-saving time on this set. Instead, when you determine the time zone, you only can set up for standard time. This could be rectified with a firmware update which exposes a “daylight-saving” on-off function or access to a table of “spring-forward / fall-back” times hosted on the manufacturer’s Website.

Another improvement that I would like to see would be to support regular AA, C or D batteries even with a battery cage so you don’t have to look for the hard-to-get ChargePAK battery packs.

Conclusion

This set may be considered as an option when you want to replace that old “transistor radio” with something that gives you access to “modern” radio sources like DAB or Internet radio. It could he very useful where you want a set of this class to be highly rugged and durable.

Fake “virus-infection” phone calls–be aware of them

News Article

Phone scammers target computer owners | ABC News Australia

Alert over scam phone calls about bogus computer virus | Wolverhampton City Council (United Kingdom)

My Comments

Just today, a friend of mine who I live with received a phone call on our house phone saying that their computer is infected with a virus and she was being instructed to do certain procedures on the household computer. Luckily she told the caller to hang up and put the phone down and didn’t head towards the computer. This was very good for someone who hasn’t much familiarity with computer technology.

This is part of a scourge that is affecting home and small-business computer users and computer novices are more likely to be at risk of this fraud because they may not know the difference between a virus attack or a computer being very sluggish.

There has been some press coverage and coverage in government consumer-protection Websites and bulletins around the world concerning this topic, with a lot of weight placed on reference to the scammers claiming they represent Microsoft. But the scammers can pretend they represent other legitimate IT companies like antivirus software firms.

If you needed outside help regarding computer issues, you will most likely have initiated the contact yourself, whether through your computer-expert neighbour, relative, friend or acquaintance; your workplace’s IT support if your workplace has such a department or your computer supplier.

What these callers tend to do is to lead the user to download and install malware, usually in the form of spyware or fill in forms with email addresses and credit-card details in order to facilitate various forms of fraud against the user. This can be in the form of milking their bank account and credit-card of useable funds, inundating their email inbox with spam email or stealing other information that is confidential to them or their business operations.

So I would encourage all users to be careful of unfamiliar “call-centre” phone calls about computer viruses or similar issues and simply hang up when they receive these calls. As well, they should keep their desktop security programs on their computers up-to-date so as to protect against the various scams.

Other tactics that you may consider would be to threaten the scammers with legal action or question them about whether they can do business legally in your country. A good example would be asking them for their tax-registration details that are required of them if they do business in your country, such as the VAT registration details if you are in Europe or the Australian Business Number if you are in Australia.