Commentary Archive

Indie games like Untitled Goose Game appeal to people outside the usual game demographics

Articles

Honk if you’ve got a hit: Melbourne-made “horrible goose” game goes global | The Age

Everyone from Chrissy Teigen to Blink-182 is freaking out about a ‘goose game’ — one look at the bizarre new game explains why | Business Insider

Untitled Goose Game Melbourne-based creators stunned after topping Nintendo charts | ABC News Australia

From the horse’s mouth

Untitled Goose Game (product page)

Video – Click or tap to play

Previous coverage on indie games

How about encouraging computer and video games development in Europe, Oceania and other areas

Alaskan fables now celebrated as video games

Two ways to put indie games on the map

My Comments

What is being realised now is that independently-developed electronic games are appealing to a larger audience than most of those developed by the mainstream games studios.

A case to point that has appeared very recently is Untitled Goose Game. This game; available for Windows or MacOS regular computers via the Epic Games Store, and the Nintendo Switch handheld games console via its app store, is about you controlling a naughty goose as you have it wreak havoc around an English rural village.

Here, it uses cartoon imagery and slapstick-style comic approach of the kind associated with Charlie Chaplin or Laurel and Hardy in the early days of cinema to provide amusement that appeals across the board. It also underscores concepts that aren’t readily explored in the video games mainstream.

This game was developed by a small North Fitzroy game studio called House House and had been underpinned by funds from the state government’s culture ministry (Film Victoria) before it was published by an independent games publisher called Panic.

A close friend of mine who is a 70-something-year-old woman was having a conversation with me yesterday about this game and we remarked on it being outside the norm for video games as far as themes go. I also noticed that her interest in this game underscored its reach beyond the usual video-game audience where it would appeal to women and mature-to-older-age adults, with her considering it as a possible guilty pleasure once I mentioned where it’s available on.

With Untitled Goose Game being successful on the Nintendo Switch handheld games console, it could be a chance for Panic or House House to see the game being ported to mobile platforms. This is more for benefit to those of us who are more likely to use an iPad or Android tablet to play “guilty-pleasure” games. This is in addition to optimising the game’s user interface for the Windows variant to also work with touchscreens so it can be played on 2-in-1 laptops.

What is happening is that there is an effort amongst indie games developers and publishers to make their games appeal to a wide audience including those of us who don’t regularly play video games.

Send to Kindle

Make VPN, VLAN and VoIP applications easy to set up in your network

Draytek Vigor 2860N VDSL2 business VPN-endpoint router press image courtesy of Draytek UK

Routers like the Draytek Vigor 2600N which support VPN endpoint and IP-PBX functionality could benefit from simplified configuration processes for these functions

Increasingly, the virtual private network, virtual local-area network and IP-based voice and video telephony setups are becoming more common as part of ordinary computing.

The VPN is being seen as a tool to protect our personal privacy or to avoid content-blocking regimes imposed by nations or other entities. Some people even use this as a way to gain access to video content available in other territories that wouldn’t be normally available in their home territory. But VPNs are also seen by business users and advanced computer users as a way to achieve a tie-line between two or more networks.

The VLAN is becoming of interest to householders as they sign up to multiple-play Internet services with at least TV, telephony and Internet service. Some of the telcos and ISPs are using the VLAN as a way to assure end-users of high quality-of-service for voice or video-based calls and TV content made available through these services.

AVM FRITZ!Box 3490 - Press photo courtesy AVM

… as could the AVM Fritz!Box routers with DECT base station functionality

It may also have some appeal with some multiple-premises developments as a tool to provide the premises occupiers access to development-wide network resources through the occupiers’ own networks. It will also appeal to public-access-network applications which share the same physical infrastructure as private networks such as FON-type community networks including what Telstra and BT are running.

VoIP and similar IP-based telecommunications technologies will become very common for home and small-business applications. This is driven by incumbent and competing telecommunications providers moving towards IP-based setups thanks to factors like IP-driven infrastructure or a very low cost-of-entry. It also includes the desire to integrate entryphone systems that are part of multi-premises buildings in to IP-based telecommunications setups including the voice-driven home assistants or IP-PBX business-telephony setups.

Amazon Echo on kitchen bench press photo courtesy of Amazon USA

A device like the Amazon Echo could be made in to a VoIP telephone through an easy-to-configure Alexa Skill

In the same context, an operating-system or other software developer may want to design a “softphone” for IP-based telephony in order to have it run on a common computing platform.

What is frustrating these technologies?

One key point that makes these technologies awkward to implement is the configuration interface associated with the various devices that benefit from these technologies like VPN endpoint routers or IP-based telephony equipment. The same situation also applies if you intend to implement the setup with multiple devices especially where different platforms or user interfaces are involved.

This kind of configuration also increases the chance of user error taking place during the process which then leads to the setup failing with the user wasting time on troubleshooting procedures to get it to work. It also makes the setup process very daunting for people who don’t have much in the way of IT skills.

For example, you have to complete many steps to enrol the typical VPN endpoint router with a consumer-facing privacy-focused VPN in order to assure network-wide access to these VPNs. This involves transcribing configuration details for one of these VPNs to the router’s Web-based management interface. The same thing also applies if you want to create a VPN-based data tie-line between networks installed at two different premises.

Similarly, IP-based telephony is very difficult to configure with customers opting for pre-configured IP telephone equipment. Then it frustrates the idea of allowing a customer to purchase equipment or software from different resellers thanks to the difficult configuration process. Even small businesses face this same difficult whether it is to add, move or remove extensions, create inter-premises tie-lines or add extra trunk lines to increase call capacity or provide “local-number” access.

This limits various forms of innovation in this space such as integrating a building’s entryphone system into one’s own telephone setup or allowing Skype, Facebook Messenger, WhatsApp or Viber to permit a business to have a virtual telephone link to their IP-telephony platforms.

It also limits the wide availability to consumers and small businesses of “open” network hardware that can answer these functions. This is more so with VPN-endpoint routers or routers that have IP-based telecommunications functionality which would benefit from this kind of simplified configuration process.

What can be done?

A core requirement to enable simplified provisioning of these technologies is to make use of an XML-based standard configuration file that contains all of the necessary configuration information.

It can be transferred through a download from a known URL link or a file that is uploaded from your computing device’s local file system. The latter approach can also apply to using removable storage to transfer the file between devices if they have an SD-card slot or USB port.

Where security is important or the application depends on encryption for its operation, the necessary binary public-key files and certificates could be in a standard form with the ability to have them available through a URL link or local file transfer. It also extends to using technologies based around these public keys to protect and authenticate the configuration data in transit or apply a digital signature or watermark on the configuration files to assert their provenance.

I would also see as being important that this XML-based configuration file approach work with polished provisioning interfaces. These graphically-rich user interfaces, typically associated with consumer-facing service providers, implement subscription and provisioning through the one workflow and are designed to he user-friendly. It also applies to achieving a “plug-and-play” onboarding routine for new devices where there is a requirement for very little user interaction during the configuration and provisioning phase.

This can be facilitated through the use of device-discovery and management protocols like UPnP or WSD with the ability to facilitate the upload of configuration files to the correct devices. Or it could allow the creation and storage of the necessary XML files on the user’s computer’s local storage for the user to upload to the devices they want to configure.

Another factor is to identify how a device should react under certain situations like a VPN endpoint router being configured for two or more VPNs that are expected to run concurrently. It also includes allowing a device to support special functions, something common in the IP-based telecommunications space where it is desirable to map particular buttons, keypad shortcodes or voice commands to dial particular numbers or activate particular functions like door-release or emergency hotline access.

Similarly, the use of “friendly” naming as part of the setup process for VLANs, VPNs and devices or lines in an IP-telephony system could make the setup and configuration easier. This is important when it comes to revising a configuration to suit newer needs or simply understanding the setup you are implementing.

Conclusion

Using XML-based standard provisioning files and common data-transfer procedures for setup of VLAN, VPN and IP-based-telecommunications setups can allow for a simplified setup and onboarding experience. It can also allow users to easily maintain their setups such as to bring new equipment on board or factor in changes to their service.

Send to Kindle

Ambient Computing–a new trend

Article

Smart speakers like the Google Home are the baseline for the new concept of ambient computing

Lenovo see smart displays as a foundation for ambient computing | PC World

My Comments

A trend that is appearing in our online life is “ambient computing” or “ubiquitous computing”. This is where the use of computing technology is effective part of our daily lives without us having to do something specific about it.

One driver that is facilitating it is the use of voice-driven assistant technology like Apple’s Siri, Amazon’s Alexa, Google’s Assistant or Microsoft’s Cortana. It has manifested initially in mobile operating systems like Android or iOS but has come about more so with smart speakers of the Amazon Echo, Google Home or Apple HomePod kind along with Microsoft and Apple putting this functionality in to desktop operating systems like MacOS and Windows.

Lenovo Smart Display press picture courtesy of Lenovo USA

as are smart displays of the Lenovo Smart Display kind

As well, Amazon and Google have licensed out front-end software for their voice-driven home assistants so that third-party equipment manufacturers can integrate this functionality in their consumer-electronics products. It also includes the availability of devices that connect to larger-screen TVs or higher-quality sound systems to use them as display or audio surfaces for these voice-driven assistants, even simply just to play audio or video content pulled up at the command of the user.

Lenovo underscored this with their current Smart Display products and the up-and-coming Smart Display products including a Lenovo Yoga Smart Tab which was premiered at IFA 2019 in Berlin. These are based on the Google Home platform and they were underscoring the role of these displays in ambient computing.

Another key driving factor is the Internet of Things which may be seen in the home context as lights, appliances and other devices connected to the home network and Internet. It doesn’t matter whether they connect to the IP-based home network directly or via a “home hub” device. These work with the various voice-driven home-assistant platforms as sensors or controlled devices or, in some cases, alternate control surfaces.

It extends beyond the home through interaction with various building-wide or city-wide services that relate to energy use, transport, personal security amongst other things.

The other key driver that is highlighted is the use of distributed computing or “the cloud” where the data is processed or presented in a manner that is made available via the Internet on any device. It can also include online services that present information or content at your fingertips from anywhere in the world. In some cases, there is the use of data aggregation to create a wider picture of what is going on.

What this all adds up to is the concept of an “information butler” that responds with information or content as you need it. This is underscored with ambient or ubiquitous computing that is not just a Silicon Valley buzzword but a real concept.

What does the concept of ambient or ubiquitous computing underscore?

Here it is the use of information technology in a manner that blends in with your lifestyle rather than being a separate activity. You interact with one or more of the endpoints while you undertake a regular daily task and this can be about showing up information you need or setting up the environment for that activity. It relies less on active participation by the end-user.

Ambient computing is adaptive in that it fits in and adapts to your changing needs. It is also anticipatory because it can anticipate future needs like, for example, changing the heating setting to cope with a change in the weather. It also demonstrates context awareness by recognising users and the context of their activity.

But ambient computing still has its issues. One key issue that is called out frequently is end-user privacy including protection of minor children when users interact with these systems. An article published by Intel underscores this in the context of simplifying the management of our privacy wishes with the various devices and online services through the use of “agent” software.

This also relates to data security for the infrastructure along with data sovereignty (which country the data resides in) due to issues like information theft and use of information by foreign governments.

Similarly, allowing ambient-computing environments to determine activities like what content you enjoy can be of concern. This is more important because you may choose particular content based on your values and what others who have similar tastes and values recommend. It can also lead to avoiding addiction to content that can be socially harmful or enforcing the consumption of a particular kind of content upon people at the expense of other content.

Another factor that can creep up if common data-interchange standards aren’t implemented is the existence of data “silos”. This is where an ambient computing environment is limited to hardware and software provided by particular vendors. It can limit competition in the provision of these services which can restrict the ability to innovate when it comes to developing these systems further.

But what is now being seen as important for our online life is the trend towards ubiquitous ambient computing that simply is part of our lives.

Send to Kindle

Why should a common retailer join in to a tech platform with their own brands?

IKEA SYMFONISK speaker range press picture courtesy of Inter IKEA Systems B V

IKEA’s affordable path to the SONOS multi-room audio ecosystem

I have seen IKEA present a set of speakers that work with the premium SONOS multiroom audio platform but are more affordable than the SONOS speakers. Then I did some research on IKEA’s Tradfri smart-lighting infrastructure and found that the affordable smart lights offered by them can work with other Zigbee Light Link compliant home-automation setups.

A very similar practice is taking place with some of the German hypermarkets who are offering multiroom audio products under their private labels such as SilverCrest by Lidl / Kaufland.

But there are attempts especially by telcos who are offering “smart-home” systems where they don’t disclose what technical platforms their system supports. This is more so when users buy “starter packs” then want to “build out” their smart-home setup by adding on the devices that suit their needs.

What benefit does this offer?

Here, a retailer or telco’s retail arm can provide a set of equipment that is part of a particular multiroom-audio, smart-home, distributed Wi-Fi or similar device platform at a price affordable for most people. This is more so where they offer the products under their own private labels that are dedicated to value-priced or budget equipment.

Such a system can allow for a low-risk entry path to the multiroom-audio, home-automation or similar platform for most users. This is more so where a user wants to start out small, typically to suit a particular need like having a few lamps managed by a smart-lighting system.

Another advantage that exists for those of us who have invested in that platform is that we can build on it in a cost-effective manner. In the case of IKEA Symfonisk speakers, a person who has one or more SONOS speakers serving one or more primary living areas like the living room or the family room could extend their SONOS multiroom-audio setup to other rooms like the bedrooms in a cost-effective manner by using Symfonisk speakers. IKEA even took this further with Symfonisk by allowing you to have a compatible SONOS soundbar and a pair of the Symfonisk speakers in order to set up a full-on surround-sound system for your TV.

The retailer also benefits from the fact that they don’t need to reinvent the wheel if they are heading towards multiroom audio, smart-home or similar technology. Here, they can come on board with a range of products that suit their brand identity and focus on their specialities like, perhaps, home furnishings.

How does this work effectively

The key devices that are part of the device platform have to be designed as entities that can work with any systems or standards that drive the home-automation, multiroom-audio or similar platform. This means that they are to be interoperable with other devices working on that platform in a transparent manner.

If the retailer is offering a “hub” or “controller” device under their label, they may get away with something focused around their identity. But they could gain better mileage out of these devices by making them work to common technical standards so the devices can become part of the system that you want.

Some systems that allow a device to perform a supporting role like a pair of speakers augmenting a soundbar as “fronts” or “surrounds” for example could open up the path for accessing the desirable functionality.

Conclusion

When common retailers, telcos and installers offer equipment that works according to one or more common technical platforms and is affordable, this means that we can get in to the technical realms that the platforms offer with minimal risk. It also means that we can build out and add functionality to these systems in a cost-effective manner even if we use premium equipment based on these platforms.

Send to Kindle

Major improvements expected to come to Bluetooth audio

Article

Creative Labs Stage Air desktop soundbar press picture courtesy of Creative Corporation

The Bluetooth connectivity that the Creative Labs Stage Air desktop soundbar benefits from will be improved in an evolutionary way

The future of Bluetooth audio: Major changes coming later this year | Android Authority

My Comments

One of Bluetooth’s killer applications, especially for smartphones and tablets, is a wireless link between a headset, speaker or sound system to reproduce audio content held on the host computing device.

At the moment, the high-end for this use case is being fought strongly by some very determined companies. Firstly, Bose, Sony and Bang & Olufsen are competing with each other for the best active-noise-cancelling over-the-ear Bluetooth headset that you can use while travelling. This is while Apple and Sony are vying for top place when it comes to the “true-wireless” in-ear Bluetooth headset. It is showing that the Bluetooth wireless-audio feature is infact part of a desirable feature set for headphones intended to be used with smartphones, tablets or laptops.

Let’s not forget that recently-built cars and recently-made aftermarket car-stereo head units are equipped with Bluetooth for communications and multimedia audio content. This is part of assuring drivers can concentrate on the road while they are driving.

JBL E45BT Bluetooth wireless headset

.. just like headsets like this JBL one

But this technology is to evolve over the second half of 2019 with products based on the improved technology expected to appear realistically by mid 2020. Like with Bluetooth Low Energy and similar technologies, the host and accessory devices will be dual-mode devices that support current-generation and next-generation Bluetooth Audio. This will lead to backward compatibility and “best-case” operation for both classes of device.

There is an expectation that they will be offered at a price premium for early adopters but the provision of a single chipset for both modes could lead towards more affordable devices. A question that can easily be raised is whether the improvements offered by next-generation Bluetooth audio can be provided to current-generation Bluetooth hosts or accessory devices through a software upgrade especially where a software-defined architecture is in place.

What will it offer?

USB-C connector on Samsung Galaxy S8 Plus smartphone

… like with the upcoming generation of smartphones

The first major feature to be offered by next-generation Bluetooth audio technology is a Bluetooth-designed high-quality audio codec to repackage the audio content for transmission between the host and accessory.

This is intended to replace the need for a smartphone or headset to implement third-party audio codecs like aptX or LDAC if the goal is to assure sound quality that is CD-grade or better. It means that the device designers don’t need to end up licensing these codecs from third parties which will lead to higher-quality products at affordable prices along with removing the balkanisation associated with implementing the different codecs at source and endpoint.

A question that will be raised is what will be the maximum audio quality standard available to the new codec – whether this will be CD-quality sound working up to 16-bit 48kHz sampling rate or master-quality sound working up to 24-bit 192kHz sampling rate. Similarly, could these technologies be implemented in communications audio especially where wide-bandwidth FM-grade audio is being added to voice and video communications technologies for better voice quality and intelligibility thanks to wider bandwidth being available for this purpose.

Another key improvement that will be expected is reduced latency to a point where it isn’t noticeable. This will appeal to the gaming headset market where latency is important because sound effects within games are very important as audio cues for what is happening in a game. It may also be of benefit if you are making or taking videocalls and use your Bluetooth headset to converse with the caller. Here, it will open up the market for Bluetooth-based wireless gaming headsets.

It will also open up Bluetooth audio towards the “many-endpoint” sound-reproduction applications where multiple endpoints like headsets or speakers receive the same audio stream from the same audio source. In these use cases, you can’t have any endpoint receiving the program material reproducing the material later than others receiving the same material.

A key application that will come about is to implement Bluetooth in a multiple-channel speaker setup including a surround-sound setup. This will be a very critical application due to the requirement to reproduce each channel of the audio content stream concurrently and in phase.

It will also legitimise Bluetooth as an alternative wireless link to Wi-Fi wireless networks for multiroom audio setups. As well, the support for “many-endpoint” sound-reproduction will appeal to headsets and hearing-aid applications where there is the desire to send content to many of these devices using a high-quality wireless digital approach rather than RF or induction-loop setups that may be limited in sound quality (in the case of induction-loop setups) or device compatibility (in the case of RF setups). There could even be the ability to support multiple audio-content channels in this setup such as supporting alternative languages or audio description. In some cases, it may open up a use case where transport announcements heard in an airport or rail station can “punch through” over music, video or game sound-effects heard over a Bluetooth headset in a similar way to European car radios can be set up to allow traffic bulletins to override other audio sources.

A question that can be raised with the “many-endpoint” approach that this next-generation Bluetooth-audio technology is to support is whether this can support different connection topologies. This includes “daisy-chaining” speakers so that they are paired to each other for, perhaps a multi-channel setup; using a “hub-and-spoke” approach with multiple headsets or speakers connected to the same source endpoint; or a combination of both topologies including exploiting mesh abilities being introduced to Bluetooth.

Conclusion

From next year, as the newer generations of smartphones, laptops, headsets and other Bluetooth-audio-capable equipment are released, there will be a gradual improvement in the quality and utility of these devices’ audio functions.

Send to Kindle

Google to provide wireless across-the-room data transfer to Android

Article

USB-C connector on Samsung Galaxy S8 Plus smartphone

Google Fast Play could open up an improved point-to-point data transfer experience to Android smartphones

Google working on ‘Fast Share,’ Android Beam replacement and AirDrop competitor [Gallery] | 9To5Google.com

Fast Share is Google’s Android Beam replacement: Here’s what you should know | Android Authority

My Comments

Google is to provide as part of the Android platform a new “open-frame” point-to-point data-transfer solution. This solution, known as Fast Share, implements Bluetooth and peer-to-peer Wi-Fi to transfer text, pictures, Weblinks and other resources.

The Android platform had two different peer-to-peer data-transfer solutions previously. The first of these was the Bluetooth profile that was implemented by Symbian, Microsoft and others to transfer pictures, contact details and the like since the rise of the feature phone. The second of these was the Android Beam which used NFC “touch-and-go” as a discovery method and initially used Bluetooth but moved towards peer-to-peer Wi-Fi as a transfer method.

This was while Apple was using AirDrop across their ecosystem which included iPhones and iPads. In Apple’s true style, it was part of keeping as many users on the iOS platform and you couldn’t do things like transfer to other mobile or desktop platforms.

Google is intending to have Fast Share as part of their Play Services software package rather than being “baked in” to a particular version of the Android operating system. Here, Fast Share can be run with Android devices running older versions of the operating system which is a reality with a significant number of phones where the manufacturer won’t provide support for newer Android versions on particular models.

Advance images of this concept shown on the Web are underscoring a tentative plan to port it to their own ChromeOS and Apple’s iOS operating systems. If Microsoft and Apple are interested, it may be seen as a way for Windows or MacOS regular-computer users to share resources across the room on an ad-hoc basis. As well, Google could look at how Fast Share can be implemented in a “headless” form whether for sending or receiving the data.

You will have the ability to share file-based resources like photos, videos, PDFs or vCard-based contact-information files along with URLs pointing to Web-hosted resources or snippets of text. This will satisfy most usage requirements like sharing family snapshots, contact details or Weblinks.

There will be the option to give a sender “preferred visibility” status so they can discover your phone when you are near them. This status means that they will see your device if you aren’t running the Fast Share app. Of course, users can turn Fast Share on and off as required, preferably with the idea of turning it off when using the phone in a public place unless they expect to receive something. You also have the ability to decline or accept incoming files so you have some control over what you receive.

The core issue with Google Fast Share and similar point-to-point across-the-room file-transfer platforms is that they have to work in a truly cross-platform manner so you don’t have to worry whether your friend sitting in that armchair across from you is using an iPhone or Android device when you intend to send that photo to them or share your contact details.

Send to Kindle

Why do I consider a digital fax vault an important feature for multifunction printers?

HP LaserJet Pro CM1415fnw colour laser multifunction printer

HP LaserJet Pro CM1415fnw colour laser multifunction printer – an example of a fax-capable multifunction that implements flash memory and fax-vault functionality

Nearly every multifunction printer that is pitched towards small businesses and SOHO operations is equipped with basic Group 3 fax functionality at least. Most will have the high-speed Super Group 3 functionality while most multifunctions that print colour will support colour faxing.

This is a feature still considered of value by people who work in the legal, medical and allied professions because they see it as the preferred way to exchange documents “over the wire”, especially in the context of requiring other parties to sign and send the documents.

But inbound documents that arrive via these machines can be seen by people other than the intended recipients which is something that can betray the required confidentiality that most of these documents require. This is an important issue as far as client confidentiality and privacy are concerned when it comes to legal, medical or similar issues; but can also be of concern with the intellectual property that most organisations accrue such as customer / member lists or financial reports.

This can be of concern in traditional workplace environments like clinics where you have people like late-night workers or contract cleaners existing in the office beyond normal business hours. It can also be exacerbated for small-time professionals who share or sub-let office space or use serviced offices.

It can also extend to people who maintain a home office, something that is an increasing trend for small-time practitioners or people who maintain a small public storefront at other premises. In this case, even though the business operator’s household respects the business’s confidentiality requirements, there is the issue of houses being occupied by house-sitters, couch-surfers and the like who may not respect that level of confidentiality even though you trust them. It includes tradespeople who come in to your home to perform work that you require.

What is a “fax vault” and how could this feature answer these situations?

Brother MFC-J5730DW multifunction inkjet printer

Brother MFC-J5730CDW fax-equipped multifunction which can be set up to forward incoming faxes to Dropbox or OneDrive

A “fax vault” function stores all incoming fax documents to a digital storage medium of some sort rather than printing them out. Then the user enters a code and selects a “print stored faxes” function to print out the documents. Such setups could allow functions like printing out selected faxes such as those that relate to the work they are dealing with, or forwarding the documents to another fax machine like the one installed at a convenience store or newsagent to be collected there. Some machines also provide a “forward to email” function where they send the received fax document via email as a TIFF-FAX file or a PDF file.

Some of these setups may provide PIN-protected dial-in access to allow users to enable or disable this function or forward documents to a nominated fax machine from the nearest telephone like their home phone. The functionality could also be facilitated through a Web page or mobile-platform app for a granular operating experience.

The most basic form of this kind of storage is in RAM memory in the machine, but a power failure can have you lose all the documents you have received. Better implementations of this storage can be in the form of non-volatile storage like a hard disk or solid-state storage device including an SD card or flash memory installed in the machine, or the data is held on a network storage like a NAS.

For example, HP implemented integrated flash memory within the LaserJet Pro CM1415fnw that I reviewed. This was in lieu of using RAM which is vulnerable to power failure, also leading to that printer implementing a comprehensive “fax vault” function,

Brother have come close to this ideal by equipping some of their printers with “Fax Forward To Cloud” functionality provided as a machine app where documents can be held in a Dropbox or similar online-storage account. But this feature still requires the user to have documents printed out as they come in.

As I review a fax-capable multifunction printer, I applaud manufacturers who offer this function in the proper manner in their products especially if it is feasible not to print documents that are held on the storage. As well, I applaud manufacturers who implement non-volatile memory technology, preferably user-upgradeable technology or use of external, network or common cloud-based storage for incoming faxes.

The feature is important to prevent others from seeing confidential faxes which come in through the machine thus assuring client confidentiality and privacy along with intellectual-property protection for professionals.

How to achieve this better

The manufacturers could implement flash memory in their fax-capable MFCs to avoid risk of document loss during power failures.

This can be taken further with the ability for the user to install standard-form storage devices like SDXC cards, M.2 or 2.5” SATA storage devices within the machine to allow the user to install higher-capacity storage devices at a later time; or a USB port to allow the connection of USB Mass-Storage devices like memory keys or external hard disks. SD-based cards or M.2 SSD sticks can work well with the manufacturer’s desire to maintain a compact design for their desktop multifunction printer devices.

Similarly, simplified resource-discovery protocols for NAS devices could make these devices discoverable by equipment other than regular computers. This could be facilitated through a Samba (open-source SMB implementation) client on the multifunction that implements the SMB protocol most of the NAS units use.

To protect the data on the mon-volatile storage device against further snooping should the non-volatile media unit be stolen, the fax-enabled multifunction printer could implement encrypted storage or simply encrypt the files associated with fax operation. File-based encryption can also work with data stored on a NAS unit.

The large capacities offered by newer cost-effective storage media would cater to businesses in the legal profession who are having to deal with large legal documents as a matter of course, or doctors who receive graphically-rich documents like medical imaging.

It also encourages the use of the non-volatile storage medium in these machines for storing fax documents yet to be transmitted such as with scheduled faxing or attempting to transmit a document to a machine that is busy or not answering. The benefit also applies when your machine is busy printing large documents and wants to keep itself available for other incoming faxes.

For regular printing from a network, the non-volatile storage option can allow for enqueued printing where each job waits on the storage medium until it is printed out. This can also work well with secure print-job release where you enter a code that you predetermine to collect your job before the job is turned out. It can also allow manufacturers to implement remote printing, public-printing facilities and the like as part of a multifunction’s feature set.

Let’s not forget scanning, where an efficient workflow can be created. Here, a user could scan many originals at the machine then go to their computer or mobile device to take them further by “picking them up” from the machine’s storage. A multifunction with advanced abilities could even have the ability to, for example, recognise many small originals like snapshot photos, business cards or till receipts that are scanned at once and create separate files for each original.

Conclusion

Having a digital fax vault as part of a small-business or SOHO-grade fax-capable multifunction’s feature set can be of value to professionals who place high value on client confidentiality.

Send to Kindle

Lifestyle publishing heads towards the online trend

Lifehacker Website

Lifehacker – an example of the new direction in online-based lifestyle publishing

The online life has placed significant changes in the realm of “lifestyle publishing”.

What I would describe as “lifestyle publishing” are print or online publications that primarily cover lifestyle issues like living at and keeping our homes, parenting, personal health and personal / relationship issues. This kind of content is seen as being evergreen and relevant for a long time.

The classic “women’s magazines” maintained this role while running celebrity gossip and similar material. They existed in a position where they were available in the checkout lanes at supermarkets or at general/convenience stores and newsagents. As well, prior issues would exist in the waiting rooms at most medical practices and, of course, they would exist on many coffee tables as casual reading.

Some of these magazines even provide activities like crosswords and other puzzles or provide colouring-in pages and similar activities for children. This is to enhance the value of the magazine across the reader’s household. You may also find a few comic strips in the magazines as another content type.

They have been supported by various magazines that focus on particular topics like cookery, home improvement, parenting and health. It is also along with those salacious gossip magazines filled with lurid details of what the TV stars, the European royal families or other celebrities are up to.

Mamamia Website

… as is Mamamia

But, thanks to the smartphones and tablets, the direction for this kind of publishing has headed towards two major online paths. These devices have provided a portable and discreet means to consume this kind of material whether at home or out and about, in a similar way to how the e-book has been a boon to the romance novel and similar popular “guilty-pleasure” reading.

One of these are the independent blogs and small-time Websites, especially the “mum blogs”. These blogs appear on their own site or purely on a social-media platform like Facebook. People who follow the independent sites and blogs consider them authentic due to them representing the voice of the site’s or article’s author and their experiences.

MillieMummyMelbourne mum blog

… and “mum blogs” like MillieMummyMelbourne

The other fork in the road are the likes of Fusion Media Group and Pedestrian TV who maintain a large powerful blog/Website network with names like Lifehacker and Gizmodo. In this case, Fusion Media Group are franchising some of their mastheads in to other countries in a similar manner to what the Daily Mail and The Guardian are doing. It includes providing localised content for these markets as well as content that appeals across the world.

Another example of the other fork in the road is Mamamia who is becoming a powerful online “women’s magazine” focusing on what women really want. But this masthead is moving away from the traps associated with the salacious celebrity-gossip culture such as relying on imagery supplied by paparazzi photographers.

The online lifestyle publications don’t just provide content in the written form augmented with photos or other imagery. Increasingly these publications are providing audio podcasts or short videos in addition to the written content. Here, it is positioned as another way to present the same information that the site provides.

Lenovo Yoga Tab Android tablet

These mobile tablets play in to the hand of the online lifestyle publishers

Some of these online lifestyle-publishing mastheads are doing some things that aren’t really associated with the traditional women’s mags. One approach has been to review and compare different products that exist on the market and are relevant to their reader base.  This was a practice that was typically saved for car, boat, photo/audio/video and similar magazines or magazines offered by consumer-rights organisations.

But independent bloggers like the “mum blogs” are undertaking this role by reviewing or comparing household and similar goods. In some cases, the vendors supply the review samples of these goods, especially newer products, in order to have them put in the public consciousness.

There will be some continual questions raised about online lifestyle publishing.

One of these will be about monetising the content. This is more so where people are using social media, online content aggregators or email to follow the sites and read the latest content they offer.

Dell Inspiron 13 7000 2-in-1 Intel 8th Generation CPU at QT Melbourne hotel - presentation mode

.. as do the popular 2-in-1 convertible laptops like the Dell Inspiron 13 7000 2-in-1 range

This situation may affect the viability of on-site display advertising as a monetisation strategy. It is even though most of these publishers don’t have difficulty in creating family-friendly brand-safe content which can attract the advertisers to their Website.

One way this issue has been targeted is through the provision of sponsored content on these sites. The article or articles will have some input from a brand and be published with the brand’s identity appearing at various points in the article. This may also include the supply of goods and services at no cost to the blogger in exchange for them to write up a review about them like in the MillieMummyMelbourne blog regarding LEGO Duplo Stories with Amazon Alexa.

Some people see the existence of sponsored content or product reviews based on vendor-supplied samples as not being authentic. This is because they see the vendors or brand owners effectively steering the discussion regarding the goods or services being offered with the publishers extolling the advantages of these goods. This is something that has happened across lifestyle publishing in the traditional media with the use of advertorials within the magazines or infomercials being run during morning TV.

Another approach has been to run an online storefront that offers merchandise promoting the Website or designed by the author. It is more so where the author has the creative ability to design their own merchandise like clothing for example.

Another issue that will crop up is how to position online lifestyle publications in a manner to make them discoverable.

At the moment, discovery of this content is primarily through Google, Bing or other search engines especially where the search engine may surface a list-driven article written somewhere on the Internet that compares and describes the sites you are after. This takes over the role of the browsing-driven Internet directories like Lycos which existed before the Google behemoth came to the fore where Web providers could submit links to their sites to these directories.

As well, some of the online content aggregators like Feedspot or Feedly do provide the ability to search or browse for content of a kind. Similarly Web portals could be used as a tool to place online lifestyle publications “on the map”, perhaps through the use of a dedicated “lifestyle” Web portal promoted through traditional media.

Use of native or Web apps that show up strong with iPads, Android tablets and similar devices cam be a way to keep that “magazine experience” alive when you are “flicking” through these online lifestyle publications or “mum blogs”.

What needs to be done regarding online lifestyle publishing is to raise the profile of this segment to a position comparable with the traditional printed magazines. There was an episode of ABC’s “Media Watch” comparing them against the traditional womens’ magazines but this was showing concern about the sponsorship and brand-interaction issue.

Here, it was a way to use traditional media to put these blogs and sites on the map, but other resources can be used equally as well. For example, a radio or TV talk show could be used as a platform to interview lifestyle bloggers including “mum bloggers” and place them on the map. Or traditional media can exchange content with the lifestyle Websites and blogs to, perhaps, enrich coverage of a particular topic or cross-promote resources.

What needs to happen is to increase the profile of the online publications and blogs in the context of lifestyle-focused publishing especially in the eyes of the casual readers.

Now lifestyle publishing has headed towards the online direction and is coming to a tablet computer near you.

Send to Kindle

Yale uses modules to extend smart-lock functionality

Article

Use of a user-installable module allows these Yale smart locks to work with different connected-home systems

Yale Expands Assure Lock Line With New Smart Lever Lock | Z-Wave Alliance

My Comments

Yale have implemented the smart-lock approach in a very interesting way ever since that company released their Real Living Connected Deadbolt in to the North-American market.

Here, they designed an electronic lock as a basic platform device but built an expansion-interface arrangement in to this lock’s design. Here, users could install a retrofit module in to the battery compartment on the door’s inside to add on Zigbee, Z-Wave or August smart-lock connectivity to their lockset.

This approach has been rolled out to the Assure range of electronic deadbolt locks and lever locksets with the use of the same module type for the whole range. It also applies to the Lockwood Secure Connect product range offered in Australia which is based on the Yale designs.

A similar approach has been implemented in the UK for some of the Yale electronic door locks sold in that market. But the modules used with the UK locksets are different to the North-American modules due to the regional differences that affect how Z-Wave and Zigbee operate and the country’s preferred building-hardware form factors. One of these units is infact designed to replace the outside cylinder on a rim-mounted nightlatch or deadlatch to enable “smart lock” functionality to this common class of door lock.

All these modules are expected to be installed in a “plug-and-play” fashion where they simply add the extra functionality to the lock or bridge it to the smart-home ecosystem once you install the module. After you install these modules in the lockset, the only thing you need to do is to pair them with the smart-home or integrated-security ecosystem.

Even within the same form-factor, the electrical interface for these modules may be varied for later products which can raise compatibility issues. Similarly, some of the home-automation integrators tend to presume that a particular module will only work with their system.

They also work on a particular “Internet-of-Things” wireless interconnection rather than an IP-based home network, requiring them to use a network bridge to work with an online service. This bridge is typically provided as part of a security-and-home-automation ecosystem whether offered by a telco, security services firm or similar company.

What have I liked about this approach is the use of user-installable modules that are designed to work across a particular Yale smart-lock range. Here, these modules interlink with Yale or third-party smart-home setups with the ability to be replaced should you decide to move to a better home-automation system that uses a different Internet-of-Things interface.

It underscores the fact that, once installed, a door lock is expected to be in service for a very long time and this same requirement will be placed upon smart locks. This is even though new smart-home or smart-building technologies will appear on the horizon.

It is similar to how central-heating systems are being enabled for smart-home operation through the use of a room thermostat that has the “smarts” built in to it. These thermostats are designed to be powered by the host HVAC system and connect to that system according to industry-standard wiring practices that have been determined and evolved over a long time.

This approach can be taken further with other devices like major appliances that are expected to serve us for a long time. Even if a manufacturer wants to create an ecosystem around its products and accessories, it needs to keep the specifications for interlinking these products and accessories the same to allow users to implement newer devices in to the system.

It can also work properly with a self-install approach where the customer installs the necessary aftermarket modules themselves or a professional-install approach which involves a technician installing and commissioning these modules. The latter approach can also work well with manufacturers who offer “functionality” or “upgrade” kits that enable the use of these modules.

The ASSA Abloy approach to making sure your smart lock works with the smart-home system by using user-replaceable modules makes sense for this class of product. Here, you are never worried about the smart-lock ability being “out of date” just because you install a home-automation setup that suits newer needs.

What needs to happen with the retrofit approach is that the physical and electrical interface for add-on modules has to be consistent across the product range or device class for the long haul. There also has be be some form of compatibility should any design revisions take place. Similarly, using a common application-level standard can work well with allowing the same device and retrofit module to work with newer systems that adhere to the relevant standards.

These expectations may not really work well with system integrators, telcos and the like who prefer to be the only source for products that work with a smart-home system.

Here, it is the first time I have noticed a smart-home device designed to be upgraded over its long service life.

Send to Kindle

Could a logical network be a data-security attribute?

Telstra Gateway Frontier modem router press picture courtesy of Telstra

The local network created by one of these routers could be seen as a way to attest proximity or effective control of these devices

In data security, there has to be a way to attest that a user has effective control of their computing devices when they are authenticating with a device or service. Increasingly, most of us are handling two or more devices in this context such as to move data between them, use one of them as an authentication factor or to verify mutual trust between two or more people.

The logical network, also called a subnet, represents the devices connected to the same router irrespective of what media they use to connect to this network like Ethernet or Wi-Fi wireless. It is represented at Layer 3 (Network Layer) on the OSI network model stack and is represented by IP (Internet Protocol) whether version 4 or 6. Routers that implement guest or hotspot/community network functionality create a separate logical network for the guest or hotspot network.

But a hotspot network can be set up to cover a large public area like a bar or cafe’s dining room or even the whole of a hotel or apartment block. As well, if a hotspot network is properly set up for the end users’ data security, it shouldn’t be feasible to discover other devices on that same logical network. This is thanks to IP-based isolation functionality that the router that serves the hotspot offers.

Here, the existence of devices on the same logical network can be used as a way to attest proximity of these devices or to attest effective control over them.

Use cases

Enhanced two-factor authentication

Increasingly, most of us who implement two-factor authentication use an app on a smartphone to provide the random key number that confirms what we have along with what we know. But in a lot of situations, we have the smartphone and the computer we want to use to gain access to the resources existing on the same network. This may be our home or business network, a public-access hotspot or tethering our laptop to a smartphone for Internet access via the mobile network.

Having both devices on the same network could be seen as a way to assess the security level of a multifactor authentication setup by assessing the proximity of the devices to each other. It is more so if the devices are communicating to each other behind the same Wi-Fi access point or Ethernet switch. This concept would be to prove that both devices are effectively being controlled by the same user.

It can also work as an alternative to Bluetooth or NFC as a device-to-device link for a transcription-free multi-factor authentication setup if you are thinking of two devices that are able to connect to a network via Wi-Fi. This is more so where the issue of phishing of multi-factor authentication setups involving the transcription of a one-time passcode has been raised.

Discovery of devices in the same network

The same concept can also be examined in the context of interlinking between devices that exist on the same network or even determining one’s “home” domain in the context of AV content rights. In some ways, the concept could also be about tokenised login for online services where a user’s credentials are held on one device like a smartphone but a session-based token is passed to another device like a set-top box to facilitate login from that device.

It is a practice that has been used with UPnP and Bonjour technologies primarily for device and content discovery. The most obvious situation would be to use Apple AirPlay or Google Chromecast to throw content to the big screen from a compatible mobile device. It also works in the same context when you set up and use a network-based printer from your computer or smartphone.

Across-the-room discovery and mutual-user authentication

Another use case this concept can apply to is “across-the-room” device discovery and mutual-user authentication. This would be used for data transfer, social networks or online gaming where you intend to share a resource with someone you talked with, invite them as a friend / follower in a social network or engage them in an online game.

Proof of presence at a particular location

Use of a logical network’s attributes can be a tool for proving one’s presence at a particular location. This is more so where the Internet service for that network is being provided using a wired-broadband or fixed-wireless-broadband approach for its last-mile, like with most home and business networks. It may not work with “Mi-Fi” setups where a mobile broadband network is being implemented for the last-mile connection.

Here, it could be used for time-and-attendance purposes including “proof of presence” for home-based carers. Or it could be used to conditionally enable particular functionality like app-based on-premises food-and-beverage ordering at a venue. To the same extent, it could be used to protect delivery services against orders that were instigated at one location being sent to another location.

Methods

Both devices existing on the same network

In a premises-specific network like most small networks, testing that both devices are on the same subnet / logical network behind the same gateway device (router) could be a way to attest that both devices are in the same premises. The same test can be performed by the use of a “hop count” on Layer 3 of the OSI network-layer tree, which also determines the number of logical networks passed.

It is a method used with a wide range of network-based AV and printing applications to constrain the discovery and control of devices by controller software to what is local to you.

But assessing whether the two devices are connecting to the same access point on a Wi-Fi network can be used to attest whether both devices are in the same room in a large Wi-Fi setup. It may not work in a network setup where different devices connect to a network using different connection media like Ethernet, Wi-Fi Wireless or HomePlug powerline. This also includes situations where multiple access points cover the same room or floor such as with large rooms or open-plan areas.

Another approach that can be used for Wi-Fi hotspot networks honouring the Hotspot 2.0 / Passpoint setup would be to read the “venue” metadata for that network and compare whether both devices are in the same venue. If this technology is able to support subdividing of a logical venue such as based on floors or rooms, this could work as a way of further attesting whether both devices are in close proximity.

A Wi-Fi wireless network can be attested through the use of the BSSID which identifies the same access point that the devices are connecting through or the ESSID which is the network’s “call sign”. The BSSID could be used for a public hotspot network including a “hotzone” network ran by a local government or ISP,or a large network that uses many access points while the ESSID approach could be used simply for a small network with a few access points.

Trusted networks with authentication certificates

On the other hand, there could be the concept of creating “trusted networks” where authentication certificates relating to the network are stored in the network’s gateway device or in infrastructure devices associated with that network. It could be used to work against man-in-the-middle attacks as well as a stronger approach to attesting trust between the client device and the network it proposes to access.

The initial appeal for this concept could be to attest the authenticity of a business’s network especially in the face of business partners or customers who want to use that network as a gateway to the Internet or use the host business’s resources.

It could have some appeal to the food, beverage and hospitality industry where particular cafes and bars are often seen by individuals and workgroups as favoured hangouts. In this context, if an individual wants to use the Wi-Fi public-access network in their favourite “watering hole” or “second office”, the “trusted network” approach can be used to verify to the customer that they have connected to the venue’s network at the venue to avoid “man-in-the-middle” attacks.

This approach is being implemented with the Wi-Fi Passpoint / Hotspot 2.0 technology to provide for the simple yet secure public-access Wi-Fi network.

The same approach can be used with a home network if the router can store data like digital certificates in onboard non-volatile memory. Then this data could be created by the ISP as a “known trusted network” with a network-specific certificate relating to the router and network equipment. Such a service could be offered by an ISP as a value-added service especially to cater for “proof-of-presence” applications.

Conclusion

Using a logical network as a data-security attribute can be effective as a security tool for some use cases. With current network equipment, this can be a surefire way of assessing device proximity.to other devices. But use of certificates stored on network-infrastructure devices like routers and provided by ISPs or similar entities can be of use for authenticated-network or proof-of-presence applications.

Send to Kindle