Category: Computer setups

What is the “new computing environment” and how to go about it?

When I talk of laptops, wireless routers and network-capable printers, I make frequent references to a “new computing environment” that these devices can enable.

What is the “New Computing Environment”

Sony VAIO E-Series laptopThe “New Computing Environment” is a home computing environment that is based around portability and flexibility. The seed for this environment has been sown with the widely-publicised Intel Centrino campaign and is becoming stronger in a lot of households.

It consists of most of the computers in the house being laptop or notebook computers.It may also include the use of “all-in-one” desktop computers similar to the newer Apple iMacs or HP TouchSmart desktops. The goal is that these computers are able to be moved easily around the house at a whim.

This environment will also encompass the use of smartphones and tablet computers for secondary computing activities like casual Web browsing, email and use of social networks.

There is a Wi-Fi home network in place that is served by at least a wireless router that is the network’s Internet “edge”. The computers may connect to that router via Ethernet if they are close to it but are typically connected to that router using the Wi-Fi network segment.

What does this lead to

Increased flexibility

The key benefit is to increase flexibility when it comes to computer use. The major benefit is that you can relocate the computer as you need it. An example that was portrayed in an Intel Centrino radio ad that was played in the UK was someone who was writing out an email on a laptop being being interrupted by another household member who had come in to do the vacuuming. Then they are able to move somewhere quieter to do the rest of their work.

Netgear DG834G ADSL2 wireless router

Netgear DG834G ADSL2 wireless router

As well, the “New Computing Environment” also leads to increased “casual computing” setups like viewing sites like YouTube or Facebook while lounging around on the sofa; going through one’s email while relaxing in bed or flicking through online news sites while in the kitchen. I even wrote a short article on this site about the trend of young people visiting Websites while watching TV.

Catering to temporary workspaces

Another very common scenario is a household without a dedicated workspace. This is where the kitchen bench or the dining table becomes a temporary office. Some households may have a collapsible table like a card table or trestle table along with one or more folding chairs, set up in a lounge area or landing for use as a temporary workspace; or may have such furniture on hand to set up a temporary workspace as required. The “New Computing Environment” allows the user to shift the computer along with the rest of their work whenever they need to do something like set the table for a meal.

Even if a household has a dedicated workspace, there will always be the need to create another temporary workspace to suit another person’s work or study needs or to suit a different type of work.

Storage flexibility

Similarly, laptop computers are much easier to store when not in use. For example, they can be put in a drawer when not needed, as I have mentioned in an older article regarding use of a laptop as a kitchen PC. This allows the machine to be well out of harm’s way which can be of concern in a busy household or with some children and pets.

As well, the laptop is also more suited to households who have older “davenport” or “roll-top” desks which are capable of being closed up when not in use. Here, these computers can be used at and stored easily in these desks. It also allows these desks to become the elegant piece of furniture that they are known for.

Suitability with “downsized living”

This computing environment is becoming increasingly relevant with people who live in smaller houses and apartments; especially city apartments.

This class of user includes “empty-nest” parents who are moving to smaller premises because their children have left the family home, but still need to be able to look after their grandchildren when they come around.  Here, their computing equipment doesn’t need to cause much space to be taken up in these smaller living quarters.

The “home-business” laptop

This kind of computing environment also suits the use of a “home-business” computer that is used at home but taken to the workplace while you are working. For some small-business operators, a large laptop like the Dell Inspiron 15R or the HP Probook 4520s may be the only computing device that they need to use for all their computing needs and you just pack this machine in the boot (trunk) of your car before you head to or from your workplace.

Implementation notes

Starting out

You will need to use a laptop computer that is commensurate to your computing needs. But it will have to be equipped with an integrated Wi-Fi wireless network interface of at least 802.11g WPA standard. This covers most laptops made over the past five years. I have reviewed plenty of laptops and notebooks on this site and will be reviewing more of them as they come along from different manufacturers. You can have a look at the list of equipment reviewed here on this page.

Compaq Presario CQ42

Compaq Presario CQ42 entry-level laptop

If you are intending to buy a new laptop computer, I would suggest that you look at the buyer’s guides that I have written – “Buying a Laptop or Notebook Computer”. Here, I have suggested the use of the 15” laptop computers as a sole or main computing device for this environment. If you have very basic needs like emailing and basic Web surfing, a unit equipped with a low-end processor and around 2Gb memory, like the Compaq Presario CQ42 that I have reviewed here, can suit your needs here. It is still worth it to spend as much as you can afford on the hard disk capacity because as you use the computer more regularly, you will end up filling the hard disk more quickly.

On the other hand, you may want to use an “all-in-one” desktop computer like one of the Apple iMac, HP TouchSmart Desktop or Sony VAIO J or L Series computers. These have the computing power, secondary storage and the screen integrated in one slim lightweight housing, with a separate keyboard and mouse. They may be useful as a “common” or “family” computer and can be stored or moved easily as long as you know how to reconnect the keyboard and mouse.

Printers

A lot of people who set up for the “new computing environment” typically use a direct-connected printer and bring the laptop closer to it in order to plug it in when they want to print or scan something.

Canon PIXMA MX-350 network multifunction printer

What you need to do for proper implementation is to use a network-enabled printer. Here, these printers connect directly to the network either via Ethernet or Wi-Fi wireless and accept their print jobs through this connection. Multi-function printers can also expose their other functions like the scanner, fax or memory-card slots to the network.

This avoids the need to connect the laptop to the printer every time you want to print something out. With a network printer, you just select that printer from the list of printers when you specify a print job from your laptop and, moments later. you will find your print job in the printer’s output tray. Here, the job is sent via the network to the printer rather than via a cable that you always connect to the printer.

“Easing the gap” towards flexibility

Some users who are used to a regular laptop computer connected by Ethernet to a single-port broadband modem at a regular workspace may still get in to the habit of connecting the laptop to the wireless router using the “old way”. This is more so if they see their computer’s home location as being on the desktop near the router and while at that location they plug it in to the Ethernet socket on the router.

Some operating systems may react in a strange way if the user plugs in the Ethernet connection while the wireless connection is still active. This may be not of concern with newer operating systems that can automatically deactivate the Wi-Fi wireless network interface if the computer is connected to the network via an Ethernet cable.  Here, the user needs to know how to manually enable and disable the Wi-Fi wireless network interface in the laptop.

Some of the computers will use a separate “Wi-Fi” button to turn the Wi-Fi modem on an off whereas more recent examples will require you to press the “Fn” key and a function key with a transmitter symbol to turn the wireless network on and off. This function may also be known as a “flight mode” and in some cases, will turn the Bluetooth function on and off at the same time.

Then what you might end up doing is to forget using the Ethernet cord and just use the laptop wirelessly as you realise you can use the Internet at home without wires.

Network-attached storage devices

If you are considering expanded or secondary data storage space for the “New Computing Environment”, you will be interested in buying a network-attached storage device. This is a dedicated external hard disk that is accessible from computers connected to your network. It is different to the idea of repurposing an old desktop computer as a shared storage server because the device is designed specifically to be a storage device and will end up being quieter, more efficient and more reliable to run than the old desktop computer.

They are relevant as a backup device; to offload rarely-touched data from your computer and/or to works as a standards-compliant media server for your music, digital pictures and videos. I have touched on this latter application in the DLNA Home Media Network series article: “Setting up for PC-free operation”.

An increasing number of wireless routers are offering NAS functionality when a USB hard disk is plugged in to them. This may be good for starting out or a temporary network-storage solution but a dedicated network-attached storage device can do the job much better for long-term use. As well, most of the routers that offer this function are very under-powered when it comes to handling USB hard disks and you would then have to use a self-powered USB hard disk or connect the “power” USB connection on small USB-powered hard disks to a powered USB hub.

Is wired technology relevant to the New Computing Environment

There are some cases where wired-networking technology is relevant to the New Computing Environment. One main case would be to support network printers or networked AV devices that don’t have integrated Wi-Fi functionality. This would be more so as you consider purchasing an Internet-enabled TV or Blu-ray player for your home and a lot of these devices may just have an Ethernet socket rather than Wi-Fi connectivity.

Another case would be to use a secondary access point to extend wireless-network coverage, such as with buildings that use thick walls made of brick, stone or similar materials; large buildings or outbuildings on a property.

Here, you may think that you have to lay Ethernet wiring through the premises and this may be expensive and of poor value if you aren’t renovating, extending or rewiring your building. In most cases, you could use HomePlug AV technology as your wired “no-new-wires” technology because this uses regular AC wiring as a data carrier.

Conclusion

What I am hoping to do with this is to explain the “New Computing Environment” that is becoming a major trend as far as home and small-business computing is concerned. This is where the computing environment is centred around the use of portable computers that connect to a wireless network.

Another major change for the Intel-based PC platform will shorten the boot-up cycle

News articles

Getting a Windows PC to boot in under 10 seconds | Nanotech – The Circuits Blog (CNET News)

BBC News – Change to ‘Bios’ will make for PCs that boot in seconds

My comments

The PC BIOS legacy

The PC BIOS which was the functional bridge between the time you turn a personal computer on and when the operating system can be booted was defined in 1979 when personal computers of reasonable sophistication came on the scene. At that time the best peripheral mix for a personal computer was a “green-screen” text display,  two to four floppy disk drives, a dot-matrix printer and a keyboard. Rudimentary computers at that time used a cassette recorder rather than the floppy-disk drives as their secondary storage.

Through the 1980s, there was Improved BIOS support for integrated colour graphics chipsets and the ability to address hard disks. In the 1990s, there were some newer changes such as support for networks, mice, higher graphics and alternate storage types but the BIOS wasn’t improved for these newer needs. In some cases, the computer had to have extra “sidecar” ROM chips installed on VGA cards or network cards to permit support for VGA graphics or booting from the network. Similarly, interface cards like SCSI cards or add-on IDE cards couldn’t support “boot disks” unless they had specific “sidecar” ROM chips to tell the BIOS that there were “boot disks” on these cards.

These BIOS setups were only able to boot to one operating environment or, in some cases, could boot to an alternative operating environment such as a BASIC interpreter that used a cassette recorder as secondary storage. If a user wanted to work with a choice of operating environments, the computer had to boot to a multi-choice “bootloader” program which was a miniature operating system in itself and presented a menu of operating environments to boot into. This was extended to lightweight Web browsers, email clients and media players that are used in some of the newer laptops for “there-and-then” computing tasks.

The needs of a current computer, with its newer peripheral types and connection methods, were too demanding on this old code and typically required that the computer take a significant amount of time from switch-on to when the operating system could start. In some cases, there were reliability problems as the BIOS had to get used to existing peripheral types being connected to newer connection methods, such as use of Bluetooth wireless keyboards or keyboards that connect via the USB bus.

The Universal Extensible Firmware Interface improvement

This is a new improvement that will replace the BIOS as the bootstrap software that runs just after you turn on the computer in order to start the operating system. The way this aspect of a computer’s operation is designed has been radically improved with the software being programmed in C rather than machine language.

Optimised for today’s computers rather than yesterday’s computers

All of the computer’s peripherals are identified by function rather than by where they are connected. This will allow for console devices such as the keyboard and the mouse to work properly if they are connected via a link like the USB bus or wireless connectivity. It also allows for different scenarios like “headless” boxes which are managed by a Web front, Remote Desktop Protocol session or similar network-driven remote-management setup. That ability has appealed to businesses who have large racks of servers in a “data room” or wiring closet and the IT staff want to manage these servers from their desk or their home network.

Another, yet more obvious benefit is for computer devices to have a quicker boot time because the new functions that UEFI allows for and that the UEFI code is optimised for today’s computer device rather than the 1979-81-era computer devices. It is also designed to work with future connection methods and peripheral types which means that there won’t be a need for “sidecar” BIOS or bootstrap chips on interface cards.

Other operational advantages

There is support in the UEFI standard for the bootstrap firmware to provide a multi-boot setup for systems that have multiple operating environments thus avoiding the need to provide a “bootloader” menu program on the boot disk to allow the user to select the operating environment. It will also yield the same improvements for those computers that allow the user to boot to a lightweight task-specific operating environment.

When will this be available

This technology has been implemented in some newer laptops and a lot of business-class servers but from 2011 onwards, it will become available in most desktop and laptop computers that appeal to home users and small-business operators. People who have their computers built by an independent reseller or build their own PCs will be likely to have this function integrated in motherboards released from this model year onwards.

Why buy a network-enabled printer instead of a direct-connected printer?

Most printer manufacturers are supplying printers and multifunction printer (all-in-one) devices that can connect to computers via a network as well as via a USB port in price ranges that most consumers and small businesses can afford.

This function has initially been provided to higher-end business-grade equipment primarily as a way of integrating them in to the business’s network and allowing them to be used by all the computers in that workplace. Now that home networks are becoming increasingly common primarily due to broadband Internet and Wi-Fi networking, this function is becoming commonly available in all but the cheapest equipment in most manufacturers’ product ranges.

You may think that a direct-connect printer is the only type of printer that you need for your home or small-business computer but it may be worth thinking about the advantages of the network-connected units now that this feature is available at an increasingly-affordable price. Similarly you may think of using a direct-connect printer with a print server such as the functionality integrated in to many recent-model routers. But there may be limitations in how this setup works, especially with the multifunction devices that are increasingly being deployed.

Many computers – few printers

You will typically end up with many computers but fewer printers in your home or small business and may find that there are particular printers that offer capabilities that are unique to them.

A network printer allows each computer to benefit from that printer’s capabilities without any need to shift the unit around or disconnect and reconnect USB cables. You also move away from the temptation to buy and maintain many cheaper printers for each computer and end up saving money in the long run.

This can allow you to invest in printers that are good for particular needs rather than a fleet of machines that effectively do the same job. A good example of this would be a medical clinic’s setup where there is a networked monochrome laser printer that turns out health-insurance forms, patient receipts and similar documents very quickly for a group of reception-desk computers and a networked colour inkjet multifunction printer that does general-purpose printing where speed isn’t necessary.

Network-capable multifunction printers expose all of their functions to the networks rather than just the printing function. This can allow for increased flexibility when it comes to scanning or “drawing-down” images from memory cards because these functions end up being shared by all the computer users. If the machine has fax functionality, there is the ability to “print-to-fax” via the network whenever you want to send a fax from one of the computers.

The “new home-computing environment”

We are also starting to see the arrival of the “new home-computing environment” where the computers in the household are laptops that are connected via Wi-Fi wireless to a wireless router. This has allowed users to use the computers anywhere in the house rather than just in the study or home office.

A network-enabled printer can allow you to avoid the need to locate the printer and connect laptop computers to it whenever you wish to print anything. Rather, you can start a print job from the laptop that you are using at the location you are using it at. You also benefit from the increased flexibility of locating the printer wherever you wish, especially if you use Wi-Fi wireless or HomePlug powerline networking to connect the printer to the network.

Conclusion

So if you are wanting to choose a printer that provides for flexibility in your network environment, it would be worth it to consider units that are network enabled.

Why buy a network-enabled printer instead of a direct-connected printer?

Most printer manufacturers are supplying printers and multifunction printer (all-in-one) devices that can connect to computers via a network as well as via a USB port in price ranges that most consumers and small businesses can afford.

This function has initially been provided to higher-end business-grade equipment primarily as a way of integrating them in to the business’s network and allowing them to be used by all the computers in that workplace. Now that home networks are becoming increasingly common primarily due to broadband Internet and Wi-Fi networking, this function is becoming commonly available in all but the cheapest equipment in most manufacturers’ product ranges.

You may think that a direct-connect printer is the only type of printer that you need for your home or small-business computer but it may be worth thinking about the advantages of the network-connected units now that this feature is available at an increasingly-affordable price. Similarly you may think of using a direct-connect printer with a print server such as the functionality integrated in to many recent-model routers. But there may be limitations in how this setup works, especially with the multifunction devices that are increasingly being deployed.

Many computers – few printers

You will typically end up with many computers but fewer printers in your home or small business and may find that there are particular printers that offer capabilities that are unique to them.

A network printer allows each computer to benefit from that printer’s capabilities without any need to shift the unit around or disconnect and reconnect USB cables. You also move away from the temptation to buy and maintain many cheaper printers for each computer and end up saving money in the long run.

This can allow you to invest in printers that are good for particular needs rather than a fleet of machines that effectively do the same job. A good example of this would be a medical clinic’s setup where there is a networked monochrome laser printer that turns out health-insurance forms, patient receipts and similar documents very quickly for a group of reception-desk computers and a networked colour inkjet multifunction printer that does general-purpose printing where speed isn’t necessary.

Network-capable multifunction printers expose all of their functions to the networks rather than just the printing function. This can allow for increased flexibility when it comes to scanning or “drawing-down” images from memory cards because these functions end up being shared by all the computer users. If the machine has fax functionality, there is the ability to “print-to-fax” via the network whenever you want to send a fax from one of the computers.

The “new home-computing environment”

We are also starting to see the arrival of the “new home-computing environment” where the computers in the household are laptops that are connected via Wi-Fi wireless to a wireless router. This has allowed users to use the computers anywhere in the house rather than just in the study or home office.

A network-enabled printer can allow you to avoid the need to locate the printer and connect laptop computers to it whenever you wish to print anything. Rather, you can start a print job from the laptop that you are using at the location you are using it at. You also benefit from the increased flexibility of locating the printer wherever you wish, especially if you use Wi-Fi wireless or HomePlug powerline networking to connect the printer to the network.

Conclusion

So if you are wanting to choose a printer that provides for flexibility in your network environment, it would be worth it to consider units that are network enabled.

Feature Article – Moving your closed-circuit TV surveillance to IP technology

WARNING THESE PREMISES ARE PROTECTED BY VIDEO-SURVEILLANCE

The typical video-surveillance system

You have established a video-surveillance system in your business premises and have had it going well for many years. It would be based on four to nine analogue cameras located through the business premises and all of these cameras are connected to a multiplexer, commonly known as a “quad”. This device, which presents video images from the cameras in a sequence and / or as a matrix of four images on the one screen, is then connected to a VHS time-lapse video recorder that is recording whatever is going on in the premises. You are able to see the output of the cameras through one or two monitors, whether dedicated video monitors or a spare TV that is pressed in to service as a monitor.

If you are lucky enough to do so, you may have used a dedicated digital video recorder instead of the VHS time-lapse video recorder as the system’s video recorder. These units would have a built-in hard disk and may copy images or video segments that are needed for reference to a DVD using an integrated DVD burner. There is also an increased likelihood of these units being able to work with multiple cameras without the need to use a “quad”.

But now you have heard talk from people in the IT or security industry, such as your system’s installer, about the concept of network-based video surveillance and perhaps seen other businesses and government sites being equipped with this technology. What with the ability to have the increased expandability and flexibility that it provides at all points of the equation.

What benefits does the new IP technology provide?

For example, you could have the recording functionality located away from the premises so employees can’t handle the recording media or to permit security firms to offer offsite video monitoring as another service. In some cases, an IP-based video-surveillance system can make it easier for business partner groups such as police officers or your landlord’s security team to easily “patch in” to your cameras as needed and upon you agreeing without upsetting your existing system’s setup.  As well, you may want to benefit from advanced handling of the video feed which can lead to functions like video motion detection, automatic vehicle number-plate (license-plate) recognition or people-counting being part of your system, whether integrated in to the cameras or as part of extra software in other system devices. These systems may also offer the ability to use high-resolution cameras which may appeal to you in certain security scenarios like fraud detection.

The technology is becoming available at a cost that most small business users can afford. One of the reasons is because most of the infrastructure may already exist due to the data network being laid down for Internet access and computer networking. Similarly, you may benefit from your network-attached storage device or business server being able to work as a DVR device simply by you adding cheap or free software to that device. On the other hand, there are some DVR devices that work with network cameras and offer a lot more video-surveillance functionality and integration in the long run, with some of them offering a Web-based system dashboard available over the network. As well, your regular desktop or laptop PCs can work as cost-effective system-control and monitoring terminals through the addition of cheap or free software or the computers’ Web browsers being pointed to the cameras’ Web sites. This may then make you think that your closed-circuit TV system is simply “too old” for today’s requirements. How should you go about moving towards the technology?

The IP network infrastructure

The network infrastructure that is part of your IP-based video surveillance system should be based on Cat5 Ethernet cable, which can be used as your business’s wired data network. This can provide for a reliable system and permit you to move towards “Power Over Ethernet”, which allows a single Cat5 Ethernet cable to carry power to the cameras as well as the data back from the cameras. This is infact a scenario you should look towards deploying, with a multi-port “power midspan” or “powered switch” providing the power-supply needs for the cameras and obtaining its power via a good-quality uninterruptible power supply that has adequate power capacity.

You could use other network media like Wi-Fi or HomePlug powerline for supplementary camera installations such as additional event-specific cameras or test-run cameras that you may use as part of building out your system.

Standards and setup issues

When you choose your equipment, make sure that your equipment works to common standards such as video codecs that are commonly in use or Internet-standard protocols. You may also want to make sure that each camera is accessible by either a known IP address or host name through the logical network at all times so as to make it easy to set up or revise your system.

If you are thinking of remote access, it may be worth using a dynamic-DNS service or fixed IP service; and establish port mapping so you can navigate to the cameras from outside of the network. This is to allow you to use a known IP address or fully-qualified domain name to refer to your system from outside.

The main objective with a proper IP upgrade is that you don’t lose any functionality that your existing system has provided you. Rather, you gain more in the way of functionality, expandability and security from the new setup because of the new features that the IP-based equipment and software will provide.

The upgrade path

Check your DVR for additional network functionality

If your system uses a DVR rather than the VHS time-lapse recorder as its recording device, find out if the DVR offers access to stored footage or live camera streams via industry-standard network setups. It also includes the possibility of the DVR sending images or footage to nominated people by e-mail or MMS in response to an alarm event. As well, the extra functionality could also include the ability to record images or footage from network cameras.

This functionality may be available through hardware and/or software that you may be able to retrofit, whether done by yourself or a competent computer or security technician. The software may be available for a very low price or, in some cases, for free from the manufacturer’s site or a respected third-party developer.

Network video encoders

These devices are used to connect the existing system to your network. They come in one-channel or multi-channel versions. The one-channel version can service one existing camera or the “MONITOR” output of an analogue system’s multiplexer, whereas a multi-channel version can service multiple cameras. The latter solution can come in handy if you want individual access to your legacy system’s camera outputs via your network.

It is also worth noting that some of the high-end network video encoders come in the form of an expandable infrastructure where there are many encoder “blades” that are installed in a rack-mount “master chassis”. This could allow a user to increase the number of channels in the encoder simply by replacing the “blade” which has fewer channels with one that has more channels. These units may appeal more to installations where there are many serviceable analogue cameras.

If any of the cameras in your system use “pan-tilt-zoom” functionality, the network video encoder that you use for these cameras should have a compatible “PTZ” interface so that you don’t lose this functionality. Similarly, if your system uses alarm connectivity for changing how it records the video information, the network video encoder should support this same alarm connectivity.

Recording

The IP-based video-surveillance system has increased recording flexibility compared to the legacy systems. Here, you could have the images captured on a network-attached storage unit that exists within the logical reach of your business network. For example, you could have one of QNAP’s multi-disk “muscle-NAS” units located in your premises AND a D-Link two-disk NAS at home or in another premises under your control set up to record images from the same lot of cameras  You also benefit from the fact that most of these NAS units can be upgraded to higher capacity in the field through the purchase of larger capacity OEM hard disks from independent computer stores.

In some cases, you can set up some of the NAS units like most of the QNAP range to work as network video recorders by installing software applications in these units. This usually allows the cameras and the recordings to be viewed from the NAS’s management Web page.

It may be worth knowing that there are some special NAS units that are optimised for IP-based video-surveillance setups. These will usually have functions like a Web-based dashboard, improved user interface for indexing and, in some cases, video-analysis functionality not available in the cameras. These are worth considering for larger video-surveillance systems.

Alarm integration and POS Exception Monitoring

Your system may be set up so that your video recorder works in real time if, for example, the building’s alarm is triggered or a staff member presses the duress-alarm button during a hold-up. You can make sure you don’t lose this functionality when your system is network-enabled. As well, you may benefit further from this through network cameras sending through pictures to specified e-mail addresses or MMS-enabled phone numbers upon alarm events.

To achieve this, you need to make sure that your cameras that are in the alarm’s scope have alarm-input terminals and that the signalling devices are properly wired to these terminals as specified in the documentation. In some cases, you may need to use a relay or optocoupler as a way of achieving a compatible connection that operates properly. An alarm installer or electronics technician can do this kind of work easily.

If you are a retailer who integrates POS Exception monitoring where certain normal or abnormal transactions cause your closed-circuit TV system to register them as alarm events or overlay transaction data on the video information, you should make sure you can integrate this functionality in your network-enabled system. The network-based system may allow for transaction-searching or exposure of transaction data independent of the video and could work with network-based POS systems.

Scenarios

These scenarios avoid the need to replace any equipment that is in good working order ahead of its time and prefer that the IP-based technology be “bolted on” to a video-surveillance system in a manner to enhance the system without losing any of its functionality.

Simple network enablement

You may simply start out by connecting the monitor output of your existing system to a single-channel network video encoder. This may be of use if your current-term objective is to view the system’s output on your network-connected PC or your mobile phone.

On the other hand, you may use a multi-channel network video encoder to network-enable all the cameras in a small 4-camera system or, for a larger system, a few cameras that you consider important as well as the monitor output. Then you add another multi-channel network video encoder to network-enable more cameras. You then run a video-surveillance manager program on your general-purpose PC so you can easily view the cameras and set up your network-based recording options.

You will still keep your “quad” and VHS time-lapse recorder or DVR going as a “failover recording setup” until that hardware breaks down irreparably.

Additional or replacement cameras

When you “build out” your video-surveillance system with extra cameras or replace any of the existing cameras, the newer cameras that you deploy in this scenario should be network-capable units. As mentioned before, you run a video-surveillance program on your PC to set up the recording and viewing options.  If you have enough room on your existing system’s multiplexer for extra channels or are replacing existing cameras, you have the option to connect these cameras to the multiplexer because they will have video outputs as well as network outputs. This setup will then appeal to those of us who have plenty of mileage left on the older equipment and still want to use that equipment to record the footage; or haven’t yet run Ethernet wiring out to the new cameras.

Moving away from tape or proprietary DVR

Your VHS time-lapse recorder may be just at the end of its service life and you may be thinking of where to go next. Similarly, you may have had enough of that proprietary DVR that cannot be expanded easily and want to look for something better. This could be a time to network-enable your existing video-surveillance system. Here, you could deploy a multi-channel network video encoder and a network-attached storage like a QNAP unit on your network dedicated for the video surveillance system. Then you use video-management software on your PC to direct the cameras to record to the NAS and to make DVDs of footage that you need to provide.

Complete system upgrades

You may be in a position to upgrade your video-surveillance system, such as through new premises, renovations, newer security requirements placed by government, insurance or company needs; or a large number of the components coming to the end of their useful life. Sometimes, the government may financially assist you in improving your system whether through a grant, loan or tax break towards the cost of the equipment as part of a compliance or “safer cities” program.

This upgrade may give you the break to move towards an “all-IP” system with IP-based cameras, one or more recording devices being network-attached storage devices, computers running video management software; and all of them interconnected using the business’s Cat5 Ethernet cabling.

Conclusion

Any business who has the premises protected by a video-surveillance system should be aware of the IP-based video-surveillance setups. As well, they should know when to evolve to the IP-based technology and how to do it without unnecessarily replacing existing equipment.

Keeping the WiFi public hotspot industry safe

Originally published: 12 March 2009  – Latest update 20 April 2010

There are an increasing number of WiFi wireless hotspots being set up, mainly as a customer-service extra by cafe and bar operators. But there have been a few security issues that are likely to put users, especially business users off benefiting from these hotspots.

This is becoming more real due to netbooks, mobile Internet devices, WiFi-capable smartphones and other easily-portable computing devices becoming more common. The hotspots will become increasingly important as people take these devices with them everywhere they go and manage their personal or business data on them.

The primary risk to hotspot security

The main risk is the “fake hotspot” or “evil twin:. These are computers or smart routers that are set up in a cafe or bar frequented by travellers, business people or others who expect Internet access. They can be set up in competition to an existing hotspot that offers paid-for or limited-access service or on the fringes of an existing hotspot or hotzone. They offer the promise of free Internet access but exist for catching users’ private information and/or sending users to malware-laden fake Websites hosted on the computers.

Standard customer-education practices

The common rhetoric that is given for wireless-hotspot security is for the customer to put most of their effort into protecting their own data without the business owner realising that their hotspot service could be turning in to a liability. This can then lead to the hotspot service gathering dust due to disuse by the customers it was intended to serve.

The typical advice given to users is to check whether the premises is running a wireless hotspot or if there is a hotzone operating in the neighbourhood before switching on the wireless network ability in your laptop computer. Then make sure that you log on to a network identified by a legitimate ESSID when you switch on the wireless network ability.

Other suggestions include use of VPNs for all Web activity, which can become difficult for most personal Web users such as those with limited computer experience. Some people even advise against using public Internet facilities like Internet cafes and wireless hotspots for any computing activity that is confidential on a personal or business level.

But everyone involved in providing the free or paid-for hotspot service will need to put effort into assuring a secure yet accessible hotspot which provides a high service quality for all users. This encompasses the equipment vendors, wireless Internet service providers and the premises owners.

Signage and operating practices

When Intel promoted the Centrino chipset for laptop computers, they promoted wireless hotspot areas that were trusted by having a sticker with the Centrino butterfly logo at eye level on the door and the premises being scattered with table tent cards with that same logo. Similarly hotspot service providers and wireless Internet service providers used similar signage to promote their hotspots.

But most business operators, especially small independently-run cafes and bars, commonly deploy “hotspot-in-a-box” solutions where they connect a special wireless router that they have bought to their Internet service and do their own promotion of the service. This may simply be in the form of a home-printed sign on the door or window or a home-printed display sign near the cash register advising of WiFi hotspot service.

An improvement on this could be in the form of the ESSID matching the business’s name and listed on the signage, which should have the business’s official logo. Similarly, the network could be set up with WPA-PSK security at least with the passphrase given to the customers by the business’s staff members when they order hotspot service. Most “hotspot in a box” setups that list the customer’s username and password on a paper docket also list the ESSID and WPA-PSK passphrase on these dockets. As well, I would modify the login page to convey the business’s look with the business’s logo and colours. A complimentary-use hotspot could be secured with a WPA-PSK passphrase and the customer having to ask the staff member about the passphrase. This could allow the facility to know who is using the hotspot and the organisation who runs that hotspot can have better control over it.

It may be worth the industry investigating the feasibility of using WPA-Enterprise security which is associated with different usernames and passwords for access to the wireless network. Most portable computers and handheld devices in current use can support WPA-Enterprise networks. This can be implemented with the typical “paper-docket” model used by most “hotspot-in-a-box” setups if the authentication system used in these units works as a RADIUS server and the built-in wireless access point supports WPA-Enterprise with the unit’s built-in RADIUS server. The same setup could work well with a membership-based hotspot service like a public library with the RADIUS server linked to the membership database. But it may not work easily with hotspot setups that work on a “self-service” model such as paid-service hotspots that require the user to key in their credit-card number through a Webpage or free-service hotspots that use a “click-wrap” arrangement for honouring their usage terms and conditions.

The organisation who runs the hotspot should also be aware of other public-access wireless networks operating in their vicinity, such as an outdoor hotzone or municipal wireless network that covers their neighbourhood; and regularly monitor the quality of service provided by their hotspot. Also, they need to pay attention to any customer issues regarding the hotspot’s operation such as “dead zones” or unexpected disconnections.

People who own private-access wireless networks should also keep these networks secure through setting up WPA-secured wireless networks. They should also check the quality of their network’s service and keep an eye on sudden changes in their network’s behaviour.

When wireless-network operators keep regular tabs on the network’s quality of service, they can be in a better position to identify rogue “evil-twin” hotspots

Improved standards for authenticating wireless networks

There needs to be some technical improvement on various WiFi standards to permit authentication of WiFi networks in a manner similar to how SSL-secured Web sites are authenticated. This could be based around a “digital certificate” which has information about the hotspot, especially:

  • the ESSID of the network ,
  • the BSSID (wireless network MAC) of each of the access points,
  • the LAN IP address and MAC number of the Internet gateway
  • the venue name and address and
  • the business’s official name and address.

The certificate, which would be signed by public-key / private-key method could be part of the “beacon” which announces the network. It would work with the software which manages the wireless network client so it can identify a wireless network as being secure or trusted if the signature is intact and the network client is attached to the network from the listed BSSIDs and is linking to the gateway LAN IP.

The user experience would be very similar to most Internet-based banking or shopping Websites where there is a “padlock” symbol to denote that the user is using an SSL-secured Website with an intact certificate. It will also be like Internet Explorer 7 and 8 where the address bar turns green for a “High-Assurance” certificate which requires higher standards. In this case, the user interface could use colour-coding and / or a distinctive icon for indicating a verified public network.

The provision of cost-effective wireless-network management software

There are some programs that can turn a laptop computer in to a wireless-network survey tool, but most of them don’t show much useful information, are hard to operate for anyone other than a network technician; or are too costly. They miss the needs of people who run home or small-business wireless networks or wireless hotspots.

What needs to exist is low-cost wireless-network management software that can work with the common Microsoft or Apple platforms on computers that have common wireless . The software should be able to use commonly-available wireless network adaptors such as the Intel Centrino platform to perform site surveys on the WiFi bands and display the activity on these bands in an easy-to-view but comprehensive manner. The software should be easy to use for most people so they can spot interference to their wireless network easily and can “tune” their wireless network for best performance.

An application that is matching this need is MetaGeek’s inSSIDer, a free wireless-network site survey tool for the Windows platform which I have reviewed in this blog. It has the ability to list all the networks receivable by signal strength, MAC address, SSID or channel; or plot a graph of the networks by signal strength over time; or plot a graph of all the access points by signal strength over channel. This may help with managing your hotspot by identifying rogue access points and “evil-twin” hotspots.

Similarly the popular smartphone and PDA platforms like Applie iPhone, Android, Symbian S60 / UIQ, Blackberry and Microsoft Windows Mobile could have low-cost wireless-network management software written for them so they can make a handheld PDA or mobile phone work as a site-survey tool for assessing quality of service.

Once this kind of software is available for small business and home users, it empowers them to assure proper coverage of their network and check for any “evil twin” or other rogue hotspots being set up to catch customers.

Summary

There needs to be more effort put in to setting up secure public-access wireless networks so that people can benefit from portable computing anywhere without forfeiting the confidentiality of their personal or corporate data.

It also will encourage people to gain the maximum value out of their WiFi-enabled portable information devices whether for their business life or their personal life.

The Browser Choice Screen – we are still not happy

 Les éditeurs de navigateurs se mobilisent contre Microsoft – DegroupNews.com (France – French language)

My comments on this situation

There is still some disquiet in the European Union regarding the Browser Choice Screen that Microsoft launched in that market on 1 March 2010 to satisfy the European Commission’s anti-trust issue concerning their delivery of Internet Explorer 8 as the standard browser for the Windows platform.

The main issue was that the only browsers that were immediately visible to the user were the “top 5” desktop browsers – Google Chrome, Mozilla Firefox, Apple Safari, Microsoft Internet Explorer and Opera. The user had to “pan” the menu rightwards to see the other browsers like Maxthon, GreenBrowser, K-Meleon and Flock. This had annoyed the developers of these alternative browsers, some of which were “super-browsers” built on either the Mozilla Firefox or Internet Explorer codebases and were endowed with extra features.

These browser developers want the European Commission to mandate an easily-identifiable visual cue as part of the Browser Choice Screen user-interface to indicate more browsers available. This is even though there is a scroll-bar of variable width under the browser list that can be dragged left and right to reveal the other browsers.

Personally, I would also look into the idea of an alternative user-interface layout in the form of a 6 x 2 grid for the browser-selection part rather than the current “ribbon” menu. This can cater for more browsers to be shown to  the user, but the downside would be that it requires more screen real-estate which limits its utility on smaller screens like netbooks. It may also make the user-interface more cluttered and intimidating.

It is certainly a situation that reminds me of many council planning-permission fights that I have read about in various local newspapers whenever one of the big American fast-food chains like KFC or McDonalds wants to set up shop in a neighbourhood. A very constant argument that I read of in these reports is that the fast-food chain’s logo and colour scheme stands out like a sore thumb against all the other small cafés that had existed previously in that area. The alternative browser developers like Maxthon see themselves as the small café who is put out of business by the “big boys” (Google Chrome, Mozilla Firefox, Internet Explorer & co) who are seen in a similar light to McDonalds, KFC & co.

Understanding the Browser-Choice Screen – Updated

News articles

Microsoft offers web browser choice to IE users | BBC Technology (UK)

Microsoft about to offer Windows users a browser choice screen | The Guardian Technology Blog (UK)

La concurrence entre navigateurs web relancée en Europe | DegroupNews (France – French language)

From the horse’s mouth

The Browser Choice Screen for Europe: What to Expect, When to Expect It | Microsoft On The Issues (Microsoft)

UPDATE: The Browser Choice Screen for Europe – Microsoft On The Issues (Microsoft)

European Union press release about the Browser Choice screen

Browser Choice Screen shortcut (available anywhere in the world)

http://browserchoice.eu

Advocacy site

OpenToChoice.org (Mozilla)

My comments and further information

If you run a version of Windows XP, Vista or 7 that you bought in Europe and your default browser is Internet Explorer 8, you may be required to complete a “browser-selection” ballot screen, known as the Browser Choice screen, to determine which browser your computer should run as its default browser. It may not happen if you ran another browser as a default browser, then came back to Internet Explorer 8. It also will happen to European migrants who had brought out their Windows computers with them.

You will have to work through a “wizard” which has an introduction screen then the list of browsers presented in a random order. Once you choose that browser, it will be determined as your default Web-browsing tool every time you go to a Web page. If the browser isn’t installed on your system, the software will be downloaded from the developer’s site and installed in to your system. browser_choice_1_clip_image002_136F9F12

If you run Windows 7, the Internet Explorer “e” logo will disappear from the Taskbar, but you can still find it in your Start Menu. Then, you will be able to reattach it to your Taskbar by right-clicking on the program in the Start Menu and selecting “Pin to Taskbar”.

The Browser Choice screen will subsequently become available as another method of changing default browsers, alongside the options available when you install, update or run a Web browser.

There are some issues you may run into if you move from Internet Explorer 8 to another browser. One is that you won’t have your RSS feeds held in the Common Feed List which works as part of Windows Vista and 7. This may affect the addition of new feeds to programs that make use of the Common Feed List as their RSS data store. Similarly, Windows 7 users won’t benefit from having the tabs viewable in Aero Peek’s multi-window preview. This issue may be resolved with versions of the alternative browsers being built to work tightly with the host operating system’s features, which can be achieved with the Windows application programming interface information being made available by Microsoft.

At the moment, there isn’t a program that adds installed browsers to the shortcut menu when you right-click on a Web link. Such a program would benefit Web developers and bloggers who want to test a page under different browsers or people who want to “spread the Web-viewing load” amongst different clients.

Author recommendations (in no particular order)

I recommend any of these browsers because users don’t have to relearn the user interface if they switch between any of them.

Mozilla Firefox

Internet Explorer

Opera

Safari

Another threat to Apple being the king of “all things cool”

 Acer developing ‘ace in the hole’ ultrathin, putting MacBook Air on notice — Engadget

My comments on this topic

When Windows 7 was launched, I wrote an article on this blog about an intent by Windows-based PC manufacturers, especially laptop manufacturers to upstage the Apple Macintosh platform in the beauty, reliability and performance stakes. This was also ran in conjunction with HP launching their Envy laptop series which reminded me of the Apple Macbook Pro laptops. Later on, I had blogged about an ASUS laptop that would appeal to people who love the design masterpieces that are the Bang & Olufsen TVs and music systems.

In the earlier article, there had been some mention about Acer designing a multi-touch all-in-one PC. They had also come good on an ultra-thin Windows 7 laptop that is intended to upstage the Apple Macbook Air series of laptops. This Intel Core-powered unit will be designed with a thickness goal of 1.9cm (0.7 inches) and, of course, will be relatively light. Acer have an intention to release the machine sometime “this year” but I would place its availability sometime before the end of the next financial year.

This certainly shows that since Apple Snow Leopard and Microsoft Windows 7 were launched, the competition for computer hardware that pleases most everyday users has become more intense.

A laptop that will directly please the Beo-enthusiasts

ASUS NX90: Bang & Olufsen ICEpower Laptop [CES 2010] | Laptop at Hardware Sphere

Dual-touchpad laptop from Asus and Bang & Olufsen – CNET Crave

My comments

Beosound Ouverture There are those of you who may own or have used Bang & Olufsen hi-fi systems or TVs and have become amazed at the beauty of these Danish design masterpieces. Then when you switch on any of these masterpieces, your experience with them is so special, with such benefits as high-quality sound and pictures and a distinct “feel” and user experience.

You may be wondering when this kind of experience will appear on your computer and may have thought of using the Apple Macintosh as a way of coming closer to this experience.

Now Asus have brought this experience closer to the Windows PC user through the release of a laptop computer that has been designed in conjunction with this company. David Lewis, who is a freelance industrial designer who has designed most of the classic B&O masterpieces such as the Beosound 9000 music system and the Beovision LX and MX series of television sets, has been responsible for the key aspects of this design. Similarly, the pictures of this computer when it was open reminded me of the Master Control Panel that was part of the Beosystem 6500 music system, especially with the black keyboard area and the polished-aluminium palm rest. The screen bezel had the speakers integrated in it and was wider than the keyboard area. This made it have the look of one of B&O’s newer flatscreen TVs.

None of this design is complete without there being improvements in the sound-reproduction department. Here, they also used the B&O’s ICEPower Class-D switch-mode power amplification technology, which is known to be one of the few amplifier designs of this type that yield high-quality sound.  The main reason that the speakers are in the screen bezel, rather than facing upwards from the keyboard area, are to focus the sound at the user. This is the common setup practice for sound playing to the audience and is used for hi-fi, TV sound, desktop PCs and other common speaker-based sound reproduction tasks.

With Asus becoming involved with one of the few “audio companies of respect” to design a high-end laptop computer, this certainly shows that there is effort being taken in improving the sound quality of these computers. If this happens further, the quality of the sound that emanates from this class of computer could be improved rather than us having to stick with the usual weak tinny sound or connect these computers to external speakers for better sound reproduction.

These computers also used a “dual-touchpad” design which is often described as being similar to how a master DJ cues up records on his two turntables. This then allows for increased control of the computer, especially when scrolling through material.

Of course, the specifications and software provision are not dissimilar to a high-end multimedia laptop running Windows 7.

This also means that people who work with the Windows operating system can still benefit from classy and elegant computer designs. Once we see computers like this appearing on the market, there will be the desire to offer something that bit extra when it comes to the business-personal laptop computer.