Current and Future Trends Archive

NETGEAR to offer one of the first Wi-Fi 6 distributed-wireless setups

Article NETGEAR Orbi with Wi-Fi 6 press picture courtesy of NETGEAR

Netgear takes its Orbi mesh Wi-Fi system to the next level with Wi-Fi 6 | PC World

From the horse’s mouth

NETGEAR

LEADING A NEW ERA OF WI-FI, NETGEAR ANNOUNCES ORBI MESH WI-FI SYSTEM USING WI-FI 6 SPECIFICALLY DESIGNED FOR THE GIGABIT INTERNET HOME (Press Release)

Product Page

My Comments

As Wi-Fi 6 (802.11ax) wireless networking comes to the fore, there will be a desire to see distributed-wireless-network systems that support this technology. Here it’s about being able to support many Wi-Fi client devices like laptops, tablets and smartphones along with devices that are designed “Wi-Fi first” including smart-home devices.

NETGEAR have started to refresh the Orbi distributed Wi-Fi system by making a new version that supports this new technology as part of the product lineup they are premiering in Las Vegas at this year’s Consumer Electronics Show. It uses the separate radio backhaul that their Orbi system is know for, thus avoiding a dent in performance that can be brought about with systems that use the main “fronthaul” Wi-Fi segment for their backbone data transfer.

But it uses four data streams across the dedicated Wi-Fi 6 backhaul to allow high-speed high-capacity data transfer. It is in addition to four concurrent data streams on the 2.4GHz band and four concurrent data streams on the 5GHZ band for the client devices to use. The system is powered by Qualcomn networking system-on-chip silicon that allows for the higher data throughput.

It is expected to appear during the second half of 2019, primarily as an updated take of the RBK50 wide-coverage devices. A question that will perplex those of us who have an Orbi distributed-Wi-Fi setup is whether the existing Orbi equipment will work with the newer Wi-Fi 6 Orbi devices.

This is more so where smaller or specialised Orbi satellite modules like the RBS50 Orbi Outdoor Satellite unit or the Orbi Voice which is a combination of a satellite unit and Amazon-Alexa-driven smart speaker are part of your Orbi setup. Or you like the idea of “pushing down” existing equipment to secondary purposes so you get more value out of the equipment you own.

What is being highlighted is the idea of using Wi-Fi 6 as a future-proof approach for wireless local networking, including distributed- Wi-FI setups.

Send to Kindle

What to expect in personal IT over 2019

Internet and Network technologies

Netgear Nighthawk 5G Mobile Hotspot press image courtesy of NETGEAR USA

Netgear Nighthawk 5G Mobile Hotspot – first retail 5G device

5G mobile broadband will see more carriers deploying this technology in more locations whether as a trial setup or to run with it as a full revenue service. It will also see the arrival of client devices like smartphones or laptops rather than just USB modems or modem routers supporting this technology.

Some users will see 5G mobile broadband as supplanting fixed broadband services but the fixed broadband technologies will be improved with higher data throughput that competes with that technology. As well, fixed broadband especially fibre-based next-generation broadband will also be required to serve as an infrastructure-level backhaul for 5G mobile broadband setups.

Wi-Fi 6 a.k.a. 802.11ax Wi-Fi wireless will be officially on the scene with more devices becoming available. It may also mean the arrival not just of new access points and routers supporting this standard but the arrival at least of client-side chipsets to allow laptops, tablets and smartphones to work with the new technology. Some countries’ radio-regulation authorities will look towards opening up the 6GHz spectrum for Wi-Fi purposes.

It also runs alongside the increased deployment of distributed-Wi-Fi systems with multiple access points linked by a wired or wireless backhaul. This will be facilitated with Wi-Fi EasyConnect and EasyMesh standards to create distributed-Wi-Fi setups with equipment from different vendors, which means that vendors don’t need to reinvent the wheel to build a distributed-Wi-Fi product line.

Consumer electronics and home entertainment

LG 4K OLED TVs press picture courtesy of LG America

LG 4K OLED TVs – a technology that could be coming more affordable over 2019

4K UHDTV with HDR technology will head towards its evolution phase with it maturing as a display technology. This will be with an increased number of sets implementing OLED, QLED or similar display technologies. It will also lead to more affordable HDR-capable TV models coming on to the scene.

Screen sizes of 75” and more will also cut in to affordable price ranges/ This will also be augmented with OLED-based screens becoming available in a “rollup” form that comes in an out like a blind or a traditional pull-down screen. Similarly, there will be a look towards the concept of “visual wallpaper” in order to justify the use of large screens in peoples’ households, including using the screen as a way to show messages or other information.

Online services will still become the primary source of 4K HDR TV content but the 4K UHD Blu-Ray disc will increase its foothold as the “packaged collectable” distribution medium for 4K video content. ATSC 3.0 and DVB-T2 will be pushed as a way to deliver 4K UHDTV content over the traditional TV aerial with this method of TV reception regaining its importance amongst the “cord-cutting” generations who dump cable and satellite TV.

JBL Link View lifestyle press image courtesy of Harman International

More of these voce-driven home-assistant devices with screens over this year

Another major direction affecting the home network and consumer electronics is an increased presence of voice-driven home-assistant services in this class of device. Typically this will be in the form of soundbars, wireless speakers, TV remote controls and similar home-entertainment equipment having endpoint functionality for Amazon Alexa or Google Assistant.

As well, the “smart screens” like what Lenovo, JBL and Amazon are offering will become more ubiquitous, with the ability to augment responses from a voice-driven home assistant. It will be part of having more household appliances and other gadgets work tightly with voice-driven home assistants.

It may be seen as an effort to bridge the multiple network-based multiroom audio platforms so you can run equipment from different vendors as part of one system. But the problem here will be that such setups may end up being more awkward to use.

The smartphone will be facing some key challenges what with people hanging on to these devices for longer and / or running two of them – one for their work or business along with one for personal life. Some new form-factors like folding smartphones will be demonstrated while some of them will be optimised for high-performance activities like gaming.

These devices are being augmented with the return of mobile feature phones or basic mobile phones. These phones are like the mobile phones that were on the market through the 1990s and 2000s and don’t connect to the home network or Internet or use these resources in a very limited way. They are appearing due to people wanting detachment from online life like the Social Web usually as part of the “back to basics” life calling, or simply as a fail-over mobile telephony device.

But as laptops and tablets become full-on computing and communications devices, the feature phones and basic phones will simply work in a complementary way to allow voice telephony or text messaging on the same service in a handheld form.

This situation is being underscored by more mobile carriers offering mobile telecommunications services that aren’t necessarily bound to one particular device. This is to face realities like the connected car, smartwatches with mobile broadband, Mi-Fi devices amongst other things which will be expected to use the same mobile service.

In the same context, there will be a market requirement for mobile communications devices, especially mobile phones, to support two or more services including multiple numbers on the same service. Primarily this will be driven by eSIM technology and over-the-air provisioning, but it will facilitate ideas like totally separate services for one’s business and private lives, or to cater towards people who regularly travel across international borders.

Security and regulatory issues

I do see a strong push towards more secure Internet-of-Things devices for residential, commercial and other applications over this year. This is as regulators in Europe and California put the pressure on IoT vendors to up their game regarding “secure-by-design” products. There is also the expectation that the Internet Of Things needs to be fit for purpose with transport applications, utilities, medical applications and the like where there is an expectation for safe secure reliable operation that cannot be compromised by cyber-attacks.

Here, it may be about the establishment of device-firmware “bug-bounty” programs by manufacturers, industry bodies and others used to unearth any software weaknesses. Then it will lead towards regular maintenance updates becoming the norm for dedicated-purpose devices. It may also include a requirement to for device vendors and end-users to support automatic installation of these maintenance updates but allow for manual installation of major “feature-addition” updates.

This is in conjunction with the Silicon Valley behemoths like Amazon, Facebook, Apple and Google having to change their ways due to them under increased scrutiny from governments, media, activist investors, civil society and end-users. It will affect issues like end-user privacy and data transparency, financial and corporate-governance / human-resources practices, along with the effective market power that they have across the globe.

Equipment design

Use of Gallium Nitride transistors for power conversion

A major trend to see more of this year is the increased use of Gallium Nitride transistor technology. This is beyond using this chemical compound for optoelectronics such as blue, white or multicolour LEDs or laser diodes installed in Blu-Ray players and BD-ROM drive for the purpose of reading these optical discs.

Here, it is to multiply the effect silicon had on the design of audio equipment through the 1970s leading to highly-powerful equipment in highly-compact or portable forms. This is through improved heat management that leads to the compact form alongside more powerful transistors for switch-mode circuits.

One of the initial applications will be in the form of highly-compact USB-C Power-Delivery-compliant chargers for laptops and smartphones. This year will be about an increased number of finished products and reference designs that, depending on the application,  yield more than 45W of DC power for USB-C PD applications from either 100-250VAC mains power or 12-24VDC vehicle / marine power. It could then be affecting multiple-outlet “charging bars” and similar devices where the goal is to have something highly compact and portable to power that Dell XPS 13 or Nintendo Switch alongside your smartphone.

I see it also affecting how power-supply circuitry for computers, peripherals, network equipment and the like is designed. This can lead towards equipment having the compact profile along with reduced emphasis on factoring in thermal management in the design like use of fans or venting.

ARM-based microarchitecture to compete with Intel’s traditional microarchitecture

In the late 1980s, the then-new RISC (Reduced Instruction Set Computing) microarchitecture excelled with graphics and multimedia applications. This is while Intel’s x86-based 16-bit traditional-microarchitecture used in the IBM PC and its clones were focused simply on number-crunching.

But 32-bit iterations of the x86 microarchitecture were able to encroach on graphics and multimedia since the early 1990s. Eventually it led to Apple moving the Macintosh platform away from the RISC-based Motorola CPUs towards Intel-based x86 and x64 traditional microarchitecture.

This was while Acorn Computers and a handful of other computer names worked towards ARM RISC microarchitecture which ended up in smartphones, tablets, set-top boxes and similar applications.

Now this microarchitecture is making a comeback with the Always-Connected PCs which are laptops that run Windows 10 on Qualcomm ARM processors for higher power efficiency. It was brought about with Microsoft releasing a Windows 10 variant that runs on ARM microarchitecture rather than classic microarchitecture.

This will lead to some computer vendors running with at least one or two of these computers in their ultraportable product ranges. But there is investigation in to taking ARM technology to higher-power computing applications like gaming and server setups.

The big question for Intel is what can they offer when it comes to microprocessor technology that can answer what Qualcomm and others are offering using their ARM processors.

Increased SSD capacity

The solid-state drive will start to approach bill-of-material per-kilobyte price parity with the 500GB hard disk. Here, it could lead towards laptops and ultra-compact desktop computers coming with 512Gb SSDs in the affordable configurations. This is also applying to USB-based external storage devices as well as what is integrated in a computer.

Here, the concept of high-speed energy-saving non-volatile storage that would satisfy a “sole computer” situation for a reasonable outlay is coming to fruition. What will still happen with the traditional mechanical hard disk is that it will end up satisfying high-capacity storage requirements like NAS units or servers. In some situations, it may lead towards more NAS units supporting multi-tier storage approaches like bring frequently-used data forward.

Conclusion

This is just a representative sample of what 2019 is likely to bring about for one’s personal and business online life, but as with each year, more situations will crop up over the year.

Send to Kindle

The new direction for online audio content

Article

Amazon Echo on kitchen bench press photo courtesy of Amazon USA

The Amazon Echo and similar devices will create new applications for audio content

2019 will see the end of baked-in, generic podcast ads | Mumbrella

My Comments

Previously there were the radio shows which were a packaged item of audio content that was broadcast by one or more stations at one or more known times. These effectively drove radio along before television came to the fore but still exist mainly in an informative manner.

This can happen in the form of talk shows primarily run on stations that run informative content to music documentaries and Top-40 countdown shows run on the commercial music stations. In some cases, scripted radio drama still exists, especially with the BBC or some community radio stations who syndicate drama series. This is in conjunction with some radio stations doing book readings, mostly for vision-impaired people but also appealing to other users like drivers.

Often what would happen if other stations are interested in the same radio show is that they would “syndicate” the show by buying rights to broadcast the show themselves. In most cases, each episode of the show would be delivered as a recording that would be played at a scheduled time that is part of the agreement. A live show prepared by an originating station may simply be streamed out to local stations who are syndicating it thanks to satellite or similar communications technologies.

But this concept is still being pushed onwards in the form of the podcast which is today’s equivalent of these radio shows. Here, these shows are available for download and can be followed using a podcast manager that you run on your regular computer or mobile device. The podcast manager, typically part of a media management program, would check for and download the latest podcasts on to your equipment and, in some cases, synchronise them to MP3 players or similar devices.

Increasingly, streaming-audio-content services like Internet-radio or music-on-demand services are becoming podcast-delivery platforms themselves. Here, the content is streamed out via the service rather than being made available for download to your computer’s local storage, but the service may offer a download option for offline listening.

Infact the podcast is being valued by radio stations in a few different ways. For example, a radio station who runs a regular radio show will offer past and current episodes of this show for download as a podcast. This can come in handy for people new to a show, who have missed episodes of that show or like to hear it at their own time and pace.

Similarly, radio stations may syndicate a podcast that their network or someone else has created. This may be used to fill a programming void that may exist while one or more of the regular shows is on hiatus.

An issue that is affecting podcasts today is how they can work with an advertising context especially if people are moving away from advertising-driven radio. Typically the podcaster who wanted to sell advertising time would have to run the same approach as a syndicated radio show that is sponsored by one or more companies.  Here, the sponsored show will have “baked in” advertising offered by the show’s sponsors that is recorded as part of the show, which is different from the “spot” approach with ads that are inserted by the broadcaster airing the show.

This arrangement will lead to situations where advertising isn’t relevant to the listener due to such factors as the advertiser not in the listener’s location. The fact that an advertisement “baked in” to a podcast can be listened to ant any time can affect material that is time-sensitive due to campaign or jurisdiction issues.

What is being looked at now with various podcast infrastructures like Spotify, Apple or Google is the ability to provide dynamically-inserted content for podcasts. This will initially be investigated with news and current-affairs shows that have up-to-date content, including the idea of using local up-to-date newsbreaks. For advertising, this can also be about the introduction of localised spot advertising in to podcasts just like what a local radio broadcaster does to a syndicated show when they air it.

Listening to podcasts will be a similar experience to listening to syndicated radio shows

The problem I see with this kind of setup as far as how podcasters are paid is that it will follow the same rules as the syndicated content aired on commercial radio and TV. If the show has sponsorship with the “baked-in” advertising, the show’s producers and talent will be paid while the localised “spot” advertising simply pays the broadcaster. They may pay the show’s producers a “cut” of that advertising revenue as part of the syndication agreement.

But with this application, it will lead to an emphasis towards addressable advertising focused on narrow factors such as age, gender or detailed location like one’s neighbourhood. There will also be some influence based on the kind of podcasts or audiobooks you play through the podcast platform.

Here, it may require podcast formats to support the addition of standard metadata in order to identify logical breaks where advertising or other content can be inserted. Then the various podcast apps and platforms that run their own ad platforms will end up inserting the localised content in to the break. This may affect approaches like downloading for offline use, where it may be about downloading a collection of files that are joined by a podcast-specific playlist or creating a single concatenated audio file representing the main and supplementary content.

The above-mentioned logical breaks will also be of importance to the radio station who wants to syndicate that podcast. This may be to allow them to fulfil their obligations whether just to call the time and identify themselves on air, or to insert other content like news flashes, advertising / sponsorship and the like.

It will also apply to how you can listen to podcast content so you can, for example, recap parts of these shows that you were distracted from. This will be of importance for those of us who listen to podcasts in areas where we can be distracted easily like in the home or office in the same manner as listening to radio there.

There is also the idea of taking audio content further. For example, BBC and Amazon tried out the idea of an old-time radio play that works in a similar manner to a “Choose Your Own Adventure” book. This is with you talking to Alexa to steer yourself through the adventure very much in a similar form to interacting with those text-based computer adventure games on an old home computer.

Other ideas being looked at include driving or walking tours with rich audio commentary that plays when you are approach each point of interest.  This would be augmented through the use of GPS or similar navigation technology in order to play audio content relevant to the location. Similarly, you would be able to use the navigation software to lead you towards other waypoints that are part of the tour.

There are also the possibility of creating games that are augmented with the various pieces of audio content. This application would be driven by voice-driven assistants, perhaps in conjunction with sensors for various board and card games. It is a similar practice to some “Name That Tune” and similar board games which are based on a regular audio CD that has audio content essential to game play.

What is happening now is audio-focused content is gaining a stronger role in our lives and there are efforts to introduce flexibility in to how this content is presented. This is more so as we listen to this kind of content on many different device types.

Send to Kindle

Connected novelties and toys–security and useability issues that affect this product class

Giftware chook (rooster)

Connected versions of classic novelties and giftware will be subject to severe scrutiny

An issue that is rearing its ugly head is the rise in availability of connected novelties and toys. They are toys, novelties, giftware, seasonal decorations and other items that are able to connect with your computer or network. This connectivity function is often sold as one of the key marketing features with it able to work with an online service of some sort.

When I talk of toys, I don’t just talk of what children play with with but also other toys that adults end up playing with. These can include the so-called “executive toys” that live on the office desk for one to keep the other hand busy while they are on the phone.

Who typically sells these products

Toys and novelties are typically sold through a large range of online and bricks-and-mortar retailers, whether they be toy stores, gift stores, souvenir outlets or multi-facet outlets including department and discount stores. In some cases such as rural areas, a store like a newsagent’s could even sell novelties or toys.

Another factor is that novelties are given away to people and businesses as a gift or premium. This can typically happen as part of a “loot bag” offered out at conferences or tradeshows or simply used as a giveaway during a presentation to encourage audience participation.

Christmas wreath

Seasonal decorations that connect to the Internet can also be a security or setup risk

The common factor here is that most of the outlets that sell this kind of product are staffed by people who don’t have much technological know-how. This can affect the procurement process affecting whether the item exhibited at the gift fair should be stocked, or providing customer advice during and after the sale including how to get the connected novelty fully operational.

Artisans who make these gifts and novelties

Amazon Echo on kitchen bench press photo courtesy of Amazon USA

Your Amazon Echo will soon be expected to work with a wide range of toys and novelties

There is also the fact that craftspeople like to make various toys, novelties, gifts and other items and sell them directly to customers or on a wholesale basis. But they do want to add some extra functionality like musicality or flashing lights to some of their product lines.

Typically, if they want this extra functionality in these gifts that they make, they have someone else make and supply the necessary components like clockwork movements or electronic-circuit kits to fulfil the extra functionality in a pre-assembled form.  Then the artisan installs the pre-assembled mechanisms or circuits in the toy or gift as part of putting the whole thing together.

It allowed these artisans to focus on their craftwork and build the items they want to sell, while being able to offer a wide range of goods. The same comments that apply to finished goods also apply to the various components and kits that are being sold to these artisans for their projects.

In this case, the artisans have to be aware of what they procure when they are being sold a “connected functionality” kit for installation in their projects. For them, they have to be aware of customer-support issues including setup and data-security issues regarding this extra functionality.

Connected modules for construction sets and similar hobbies

The same concept also extends to construction-set platforms like Meccano, Lego and FischerTechnik where children and adults build items using the pieces that are part of the respective platforms. In this case, anyone to do with these platforms could offer connected modules or kits that have the ability to control one or more items in their platform-based project like a motor, light or solenoid using an “Internet Of Things” approach. Here, these modules have to be able to seen as equivalent to a connected toy or novelty, especially if the idea is to implement cameras, microphones or GPS sensors.

It also applies to model railways, track-based car-racing sets and the like where they can be extended with functionality modules sold by the set’s vendor or a third party catering to these hobbies. Again the modules also need to be designed for security if they are capable of being part of the Internet of Things.

Use of these items

There is the desire for people to buy these toys and novelties as gifts for others in their life. It also includes the fact that the recipient wants to get the item “up and running” as soon as possible.

This will involve having the device connected to a host device through Bluetooth or USB or to a home network for proper reliable use. It should be about a standard process that is implemented for onboarding including the installation of any extra software.

Key security issues

A key security issue concerning the connected toy, novelty or similar device is that it can be an espionage item presented in an innocuous form. It can concern us both at home and in the office because we can easily be talking about items that are confidential and sensitive in our personal and business lives.

This was highlighted in a crime-fiction form to the Germanic viewership in Europe through the Munich-based Tatort “Wir Kriegen Euch Alle” (We Get You All) episode shown there on Sunday 9 December 2018. This story was focused around a connected doll that was given by strangers to various childrens’ families in middle-class Munich and was used as a surveillance tool to facilitate crimes against the families.

It underscored that Germany has some very strict policies where the sale of surveillance devices that are disguised as innocuous items isn’t allowed in that country. But, in the story, these dolls were imported in to Munich from a location in Austria which is a short drive away and facilitated by the Schengen Agreement in the European Union.

Let’s not forget the recent cyberattacks such as the Mirai botnet that were facilitated by dedicated-purpose devices like network-infrastructure equipment and videosurveillance cameras which were running compromised software. Then there are factors regarding data-storage devices and “bag-stuffer” novelties given away during business conferences where there is the possibility of them being loaded with questionable software.

What would I like to see

Security

There has to be identification on the toy’s or novelty’s packaging about what kind of sensors like location sensors, microphones or cameras that the device has, as well as whether the device transmits data to online services. This includes whether the device does this directly or via intermediary software running on other computer devices such as mobile devices running companion mobile-platform apps. Even a hang tag attached ti the novelty could highlight what kind of sensors or online services it uses which would be important for those items sold without packaging.

Preferably, this can be achieved through standard graphical symbols indicating the presence of particular sensors or the use of online services and social networks. It can also identify whether the toy’s or novelty’s functionality are dependent on these sensors or online services.

App stores and other software platforms that host “connector” software have to implement stringent permissions for these kind of devices especially if they use a microphone, camera or location sensor. There could be standards on whether the software is allowed to record from these sensors over a long time or keep the recording persistent on the host device or online service.

A limitation I would also like to see for connected toys and novelties that if they work with another computing device including a smart speaker, the connection can only be effectively within the same premises. This can be tested through the use of a peripheral-grade connection like Bluetooth or USB to a computing device or limiting the range of discovery for network-based devices to that of the same logical private network or subnet. Here, it represents all the devices on the LAN side of a home-network’s router and excludes devices existing on other logical networks served by the same physical device like “guest” or “community” networks.

As far as Bluetooth is concerned, the toys should implement authentication processes during the setup phases. Then the device ceases to be able to be discovered once it is paired with a host device. It is like what we are seeing with Bluetooth headsets and similar devices that have been recently released. They may also have to work on a limited radio range to prevent successful connection from a distance.

There should also be a simple “factory-reset” process to allow the user to place the toy or novelty in to setup mode, effectively wiping data from the device. This allows a recipient to effectively “claim possession” of the device as if it is new, avoiding the situation where they may be given something that is compromised to do what someone else wants it to do. It also applies to situations where you are dealing with ex-demo stock or gift-fair samples.

This should also apply to online services associated with these toys or novelties where the user has proper account control for the device’s presence on that service and any data collected by that device.

There are devices that observe particular functions according to a particular device class supported by many platforms like a novelty nightlight or illuminated Nativity scene that works with a “smart-home” setup or a novelty Bluetooth speaker. These devices have to work according to the standards in force for that device class and its connection to the host device or network. It is more important where the device may perform further tricks while running alongside dedicated vendor-created software but is able to have basic functionality without this software.

A software-level security approach could be achieved through an open-source or peer-reviewed baseline software that ticks the necessary boxes. This would apply to the firmware installed in the device and any apps or other companion software that is required to be run on other computing devices for the novelty to operate. It also includes a requirement that this software be reviewed regularly for any bugs or weaknesses that could be exploited, along with compliance requirements.

This could be assessed according to a set of European norms because the continental-European countries are very concerned regarding privacy thanks to their prior history.

As far as modules for integration in to toys, novelties and giftware is concerned, the modules should meet the same requirements as finished products that would have the same functionality. Craftspeople should also be aware of data security and user privacy issues when it comes to choosing modules for their projects that are dependent on computer devices or networks.

Setup and Connectivity

Another area that is a sore point for connected toys and novelties is bringing these devices on board for you to use. In a lot of cases, this is exacerbated through awkwardly-written instructions that can test one’s patience and not much knowledge about what is needed for the device to work fully.

The device packaging could use Wi-Fi, Bluetooth or other standard logos to indicate what kind of connectivity it needs to operate fully. This is to be highlighted with the “app store” logos for various operating-system app stores if the device is dependent on companion apps for full functionality. Similarly, use of other official platform logos can be used to identify compatibility with platforms like smart-TVs or voice-driven home-assistants.

Simple-yet-secure setup and onboarding procedures are to be paramount in the design of these devices. For Bluetooth-based devices, they should use “simple-pairing” such as pressing a button on the device to make them discoverable. This is even made easier with a trend towards “out-of-the-box” discoverability if the device isn’t paired with any host. Then the user activates their host device in “Bluetooth Scan” mode to discover the device,  subsequently with them selecting the device through its presentation name.

Windows, Android and iOS are even implementing simplified device-discovery routines for Bluetooth devices, with the ability to lead users to visit the app store to install complementary software. This will make things easier for users to get the toy or novelty up and running.

Wi-Fi-based devices would have to use WPS-PBC push-button setup, Wi-Fi Easy Connect, or other simplified setup processes for integration with the home network. It also applies to other network connection standards where you have to enrol the device on to that network.

Smart-home devices that implement Zigbee, Z-Wave and similar standards also have to implement simplified discovery protocols implemented in these standards to bring them on-board.

In relationship to security, I underscored the need for use of device-class standards as much as possible. But it also applies to connectivity and useability where a device that honours device-class standards is also easier to use because you are operating it the same for its peers.

Conclusion

This year will become a time where security and useability will be of critical importance when toys, novelties and other similar goods that connect to the home network and the Internet are designed and sold to consumers. Here, these issues may avoid these kind of toys ending up in disuse due to security or setup issues.

Send to Kindle

Amnesty International reports on recent email phishing attacks

Article

How Hackers Bypass Gmail 2FA at Scale | Motherboard

Hacker spoofing bypasses 2FA security in Gmail, targets secure email services | ZDNet

My Comments

Recently, it has been revealed that hackers were attacking users of secure email sites by compromising the two-factor authentication that these sites implement.

This has been found to be an attack perpetrated by nation-states against journalists, human-rights defenders, non-government organisations and their allies in the Middle East and North Africa over 2017 and 2018. Here, this user base were using GMail and Yahoo Mail Webmail services and Protonmail and Tutanota secure Webmail services that were compromised. This is because the Webmail setup typically allowed for a client-independent portable email front.

What was going on was that a phishing page was asking for the users’ email and password but this would trigger the software’s two-factor authentication routine. But the user interface was “steered” via a fake page asking for the one-time password that the user would transcribe from their mobile phone which would receive this value via text messaging. It then led to the creation of an app password, typically used for third-party apps to use the service, but was used by the hacker to sustain control of the user’s email account.

Oh yeah, there was the SSL authentication which would show a “green padlock” icon on the user’s Web browser, making the user think that they were safe. But the phishing that took place was facilitated using fake domain names that sounded and looked like the real domain names.

This loophole exploited the use of the “intact key” or “green padlock” symbol in a Web browser’s user-interface to indicate that the SSL certificate was intact and that the interaction with the Website is safe thanks to HTTPS. But users may not know they are with the wrong Website, which is the breeding ground for phishing attempts.

The other weakness that was called out was the requirement for end-users to transcribe the one-time password from an SMS message, software token app or hardware token in order to phish the account. This was aggravated through the use of an app password to allow third-party app access to the service. What is being preferred as a secure 2FA solution was a security key kept in the possession of the end-user that connects to the user’s host device via USB, Bluetooth or NFC.

Most of us can easily relate this process to using an ATM to take cash out of our account or a payment terminal to pay for goods or services using our plastic cards. Here, to facilitate the transaction, you have to present your card by inserting it in or touching it on an identified spot on the ATM or payment terminal then enter your PIN number in to the same machine.

Extended Validation SSL site as identified on Microsoft Edge address bar -

Extended Validation SSL site as identified on Microsoft Edge – notice the organisation’s legal name appearing in green text

The Websites that high-risk end-users rely on can use Extended Validation SSL or Organisation-based SSL certificates and other authentication measures to verify the Website they are visiting is the correct one. Extended Validation SSL has a stronger certificate that verifies the organisation it is associated with and implements the strongest encryption available for HTTPS. The user experience here will have a green bar in the browser’s address bar along with the typical padlock icon while the organisation’s legal name is written in the address bar before the URL. The Organisation-based SSL certificate doesn’t have the green bar or text on the user interface but lists the organisation’s legal name in the address bar. But some browsers like recent Chrome versions don’t implement the green highlighting of the legal name for EV SSL certificates.

This also includes the organisations keeping tabs on their Internet “real estate” of domain names to identify typosquatting risks and, perhaps, make further “land grabs” of domain names if they can afford it.  This is in conjunction with efforts like what Amnesty International were doing with Protonmail and Tutamota where they are made aware of fake sites and are given legal assistance to take them down.

Then browsers and similar user agents could highlight domain names in a more distinct manner so users can know where they are at. This would be more important with email clients or browsers implemented on “reduced-user-interface” platforms like mobile operating systems. As well, end-users in high-security-risk user groups could be trained to be aware of the domains associated with Websites they are visiting. Mobile browsers pitched to smartphones can also implement a way to show the organisation’s legal name on the user interface such as a caret-identified drop-down interface that comes alive with Organisational Validated or Extended Validated SSL certificates.

Webmail-based user interfaces and similar high-risk online services could move towards use of “transcription-free” two-factor authentication like FIDO-U2F-compliant security keys including software keys run on mobile platforms to provide a secure login user experience.

Similarly, token-based authentication could be the way to go for app-to-service authentication especially as we use native-client software to interact with online services. This avoids the creation of persistent “app passwords” to facilitate native client access to online services. Here I would see this as being important as something to be investigated as part working towards secure client-based email setups, especially as the client-based email provides a platform-native user interface for your email.

Each of these approaches has to be looked at in a manner to work with small and medium organisations who don’t have their own IT staff. This is more so as this class of organisation sees itself as “grown up” when it uses cloud-based line-of-business software. The issue here is to assure that authorised users have secure access to the proper service they are authorised to use.

This situation that Amnesty International raised could also bring forward the idea of non-profit entities that underscore data security for independent media and civil society. Here, it could be about extending and bolstering the Electronic Frontier Foundation’s efforts or building up legal-action funds and lawyer teams to provide legal remedies against cyber-attacks.

What is now being realised is data security has now become a human-rights issue rather than an economic necessity.

Send to Kindle

Staff panic buttons to drive networks to handle the Internet of Things

Article

Ekahau Wi-Fi Pager Tag panic button

Emergency-alert buttons like this Ekahau Wi-Fi name-tag panic-button setup will be influencing network architecture for the Internet Of Things

The Hotel Panic Button Could Redefine Hospitality Networking | IoT World Today

My Comments

In some workplaces where staff work alone at night or other times where they are in danger, portable emergency-call buttons are often used. Initially they were the same size as an older garage-door opener but they are becoming the size of a pendant, badge or fob. As well, rather than these devices lighting up a separate alert panel, they light up a message or “throw up” a map with an indicator on a regular computer running building-security software to show where the danger is.

Initially, they were being positioned for very-high-risk workplaces like psychiatric care or the justice and allied settings. But other workplaces where staff work alone are seeing these devices as an important safety measure, usually due to various occupational health-and-safety requirements.

For example, hotels in the USA are moving towards having Housekeeping staff use these devices in response to workplace agreements, industry safe-work safe-premises initiatives or city-based legal requirements. But these systems are being required to work in conjunction with the Wi-Fi networks used by staff and guests for business and personal data transfer.

A device of the kind that I had covered previously on HomeNetworking01.info was the Ekahau Real Time Location System. This was a pendant-style “panic-button” device, known as the T301BD Pager Tag which had an integrated display and call button. It also had a setup that if the tag was pulled at the nexkstrap, it would initiate an emergency response.  I also wrote an article about these Ekahau devices being deployed in a psychiatric hospital as a staff emergency-alert setup in order to describe Wi-Fi serving a security/safety use case with the home network.

This application is being seen as a driver for other “Internet-of-Things” and smart-building technologies in this usage case, such as online access-control systems, energy management or custom experiences for guests. As I have said before when talking about what the smart lock will offer, the hotel may be seen as a place where most of us may deal with or experience one or more of the smart-building technologies. Also I see these places existing as a proving ground for these technologies in front of many householders or small-business owners who will be managing their own IT setups.

One of the issues being drummed up in this article is quality-of-service for the Internet Of Things whereupon the device must be able to send a signal from anywhere on the premises with receiving endpoints receiving this signal with no delay. It will become an issue as the packet-driven technologies like the Internet replace traditional circuit-based technologies like telephone or 2-way radio for signalling or machine-to-machine communication.

The hotel application is based around the use of multiple access points, typically to provide consistent Wi-Fi service for staff and guests. Such a setup is about making sure that staff and guests aren’t out of range of the property’s Wi-Fi network and the same quality of service for all network and Internet use cases is consistent throughout the building. Here, concepts like mesh-driven Wi-Fi, adaptive-antenna approaches, load-balancing and smart smooth roaming are effectively rolled in to the design of these networks.

Wi-Fi access points in the smart-building network will also be expected to serve as bridges between IP-based networks and non-IP “Internet-of-Things” networks like Bluetooth Low Energy (Bluetooth Smart), Zigbee, Z-Wave or DECT-ULE. These latter networks are pushed towards this application class due to the fact that they are designed to support very long battery runtimes on commodity batteries like AA Duracells or coin-style watch batteries. There will be an emphasis on localised bridging and the IP-network-as-backbone to provide better localisation and efficient operation.

These systems are being driven towards single-screen property-specific dashboards where you can see the information regarding the premises “at a glance”. I would reckon that operating-system-native applications and, perhaps, Progressive Web App versions will also be required to use operating-system-specific features like notification-panels to improve their utility factor in this context.

As far as the home network is concerned, I do see most of these technological concepts being rolled out to the smart home with an expectation to provide a similar service for householders and small businesses. This is more important as ISPs in competitive markets see the “Internet of Things” and improved Wi-Fi as a product differentiator.

The use of multiple Wi-Fi access points to cover an average home being made real for a home network thanks to HomePlug wireless access points, Wi-Fi range extenders and distributed-Wi-Fi systems that will bring this kind of localised Wi-Fi to the smart home. Typically this is to rectify Wi-Fi coverage shortcomings that crop up in particular architecture scenarios like multi-storey / split-level premises and use of building materials and furniture that limit RF throughput. It is also brought about thanks to the use of higher-frequency wavebands like 5GHz as Wi-Fi network wavebands.

There will be an industry expectation to require access points and similar devices to provide this kind of “open-bridging” for Internet-of-Things networks. This is more so where battery-operated sensor or controller devices like thermostatic radiator valves and smart locks will rely on “low-power” approaches including the use of Zigbee, Z-Wave or similar network technology.

It will also be driven typically by carrier-supplied routers that have home-automation controller functionality which would work with the carrier’s or ISP’s home-automation and security services.

To the same extent, it may require “smart-home / building-automation” networks to support the use of IP-based transports like Wi-Fi, HomePlug and Ethernet as an alternative backhaul in addition to their meshing or similar approaches these technologies offer to extend their coverage.

In some cases, it may be about Zigbee / Z-Wave setups with very few devices located at each end of the house or with devices that can’t always be “in the mesh” for these systems due to them entering a “sleep mode” due to inactivity, or there could be the usual RF difficulties that can plague Wi-Fi networks affecting these technologies.

DECT-ULE, based on the DECT cordless-phone technology and is being championed by some European technology names, doesn’t support meshing at all and IP-based bridging and backhauls could work as a way to extend its coverage.

Such situation may be rectified by access points that use a wired backbone like Ethernet or HomePlug powerline.

In the context of the staff panic button use-case, it will roll out to the home network as part of a variety of applications. The common application that will come about will be to allow the elderly, disabled people, convalescents and the like who need continual medical care to live at home independently or with support from people assuming a carer role.

This will be driven by the “ageing at home” principle and similar agendas that are being driven by the fact that people born during the post-war baby boom are becoming older as well as the rise of increased personal lifespans.

Similarly, this application may also be underscored as a security measure for those of us who are concerned about our loved ones being home alone in a high-risk environment. This is more so in neighbourhoods where the risk of a violent crime being committed is very strong.

But I would see this concept work beyond these use cases. For example, a UK / European central-heating system that is set up with each radiator equipped with a “smart” thermostatic radiator valve that is tied in with the smart-home system. Or the use of many different control surfaces to manage lighting, comfort and home-entertainment through the connected home. This is something that will rise up as most of us take on the concept of the smart home as the technology standardises and becomes more affordable.

What is being highlighted is the requirement for high quality-of-service when it comes to sending “Internet-of-Things” signalling or control data as our networks become more congested with more gadgets. Similarly, it is about being able to use IP-based network technology as a backhaul for non-IP network data that is part of the Internet-of-Things but providing the right kind of routing to assure proper coverage and quality-of-service.

Send to Kindle

5G mobile broadband and Wi-Fi can complement each other

Article

Netgear Nighthawk 5G Mobile Hotspot press image courtesy of NETGEAR USA

Netgear Nighthawk 5G Mobile Hotspot – first retail 5G device

Why You’ll Still Need Wifi When 5G Is Everywhere, According To The Wi-Fi Alliance | Gizmodo

Wi-Fi Alliance: Wi-Fi, 5G will be complementary | FierceWireless

My Comments

There is some hype being driven by organisations defending the 5G mobile broadband and Wi-Fi wireless LAN technologies about their technology being the only one for our connected lives.

Some existing devices use 5G mobile-broadband technology but connect to endpoint devices like mobile phones using Wi-Fi. Initially they are routers being deployed by mobile carriers as a proof of concept or for network trials while AT&T were offering a “Mi-Fi” for retail sale in the USA that implements 5G technology. At the moment, 5G hasn’t been rolled out in the form of a smartphone or a mobile-broadband modem that is integrated in or connected by USB to a host computer.

Both Wi-Fi 5 (802.11ac and prior technologies) and 4G LTE mobile broadband have seen widespread deployment with each technology being seen by mobile users as offering a complementary role. Networks and equipment running the newer technologies (5G and Wi-Fi 6) will be backward compatible and offer a best-case approach to this compatibility. That is if both the network and end-user equipment run the same technology, the user gains the most benefit from what the new technology offers.

It has been identified that both technologies at their latest specification can complement each other. Here, 5G will earn its keep in the outdoors and in a mobile context while the Wi-Fi 6 (802.11ax) technology will earn its keep indoors. This is although public-access Wi-Fi networks will be seen by mobile carriers as a cost-effective data-offload tool.

Wi-Fi also has supporting technologies like WiGig and Wi-Fi HaLow. The former one will match 5G for speed but uses a short range equivalent to an ordinary room in the house, while the latter benefits from long range and power efficiency but doesn’t have the speed. Wi-Fi HaLow will then end up in the smart-home, smart-building, connected-car and smart-city application spaces where data throughput isn’t all that necessary. This is while WiGig will end up with virtual reality, augmented reality, 4G video and other bandwidth-intensive applications.

Then there is also the kind of spectrum available for each technology. Wi-Fi technologies primarily rely on unlicensed radio spectrum which makes them popular for households and businesses to deploy. It is in contrast to 5G which, like other cellular mobile telecommunications technologies, relies on licensed radio spectrum which the mobile carrier has to deal with the national radiocommunications authority organise and purchase a license to use.

There is also a trend regarding wireless-network equipment design where there is a software-defined approach towards the media-level components. This is facilitated with small-footprint high-capability computing power and can allow the same piece of equipment to honour newer standards.

Another factor that is never raised is the concept of the local network where data can be transferred between co-located devices at the same premises. 5G is really positioned as a wireless “last mile” setup for providing telecommunications and Internet service to the end-user. This is while Wi-Fi is intended primarily to work as a local network but is used to distribute a single broadband service to multiple endpoint devices.

What really is now seen is that the new 5G mobile broadband and Wi-Fi 6 (802.11ax) LAN technologies can complement each other in a horses-for-courses manner.

Send to Kindle

Your local library now facilitates a video-on-demand service

Article

Kanopy independent cinema page

Kanopy works with your local library to offer independent video content to stream

The Totally Free Streaming Service You Didn’t Know You Have | Gizmodo

From the horse’s mouth

Kanopy

Home Page

My Comments

I am keeping an eye out for video-on-demand services that are offering niche content like foreign-language content. This is in response to recent market consolidation in the video-on-demand market and is able to easily survive that kind of activity in the mainstream sector.

A part of the home-video era was the fact that your local library stocked video movies and made them available for loan to its members. In most cases, this was from a government-funded or private film repository that primarily offered educational content along with some locally-produced classic and historic film content. Subsequently, these libraries offered some family-friendly and niche content from the main video distributors whom they had a lending agreement with.

This has fallen away thanks to the rise of video-on-demand services that work via the Internet. But an Australian startup began to partner with various film studios, especially those out of the current mainstream, to offer a video-on-demand service that works in tandem with the local libraries and universities. Examples of this include some classic films as well as a plethora of indie material released over the years, typically material that would have been offered by some of the video distributors during home video’s early years or syndicated by TV stations when they had the ability to choose what they could ran with.

The Gizmodo article called this service out due to the loss of the Filmstruck video-on-demand service which focused on classic cinema, typically material from the Criterion collection. They were lamenting the reduced availability of evergreen video content available to see on cable TV or stream via a video-on-demand service.

You have to be a student or faculty at one of the participant universities or be a member of one of the participating local libraries. As well, in the case of library memberships, you have to make sure your membership is current and correct before you create your account or add them to your account. That includes things like overdue fines and other obligations and you may have to check if that dusty library card has expired or not, including whether it needs to be “brought forward” to their current IT setup. It does support multiple library memberships such as students at a university using a local library card or people living on the border of two different municipalities.

Kanopy works on regular computers with your Web browser but has native clients for the iOS and Android platforms. As far as smart-TV and set-top applications are concerned, they also have native clients for the Android TV, Apple TV (tvOS) and Roku platforms including the Telstra TV repackaged Roku client.  This can be improved upon through the support for Netflix-style “download to view” to allow offline viewing of content during the loan period. Here, it would come in handy with long roadtrips or flights where you don’t have reliable access to the Internet for streaming.

At the moment, Kanopy works on the same principle as the “public lending rights” that libraries pay to authors and publishers for the right to lend out the content. Typically a participating library will pay Kanopy to allow its members to view a certain number of titles per month and this will be paid to the film studios to “lend out” the content.

Kanopy could go further by approaching the public-service broadcasters around the world like the ABC, BBC and SBS to offer their homegrown content catalogues to library members through this platform.  Typically these broadcasters have built up a large amount of content that they have commissioned through the years and most of this content would fit in with Kanopy’s remit. It is already happening with the ABC and some of their shows but can easily go further. Companies and other organisations who create their own educational and training content could offer this to the Kanopy platform for public viewership.

Similarly, Kanopy could approach other organisations to expose their service to their membership. One group would be the primary and secondary schools who would use some of this material as part of their curriculum. Similarly, they could “knock on the door” of more independent studios and quality film distributors to make your local library a viable alternative to what Hollywood puts out. As well, the travel industry could benefit from having access to the Kanopy platform for in-flight or in-room entertainment that is enriching and thought-provoking.

What at least is happening is that Kanopy is bringing the concept of the videos or DVDs made available for loan through the public library systems into the 21st century thanks to online streaming via your home network.

Send to Kindle

Orange to launch their own smart speaker platform in Europe

Article

Freebox Delta press photo courtesy of Iliad (Free.fr)

Freebox Delta as an example of a European voice-driven home assistant

Orange adds smart speaker to control TV | Advanced Television

My Comments

Some European companies are working on their own voice-driven assistant platforms. At the moment, Movistar and Free have platforms that are part of their triple-play set-top-box services while the BMW Group are working towards one for the automotive context.

But Orange who have a foothold in France and Spain as far as multiple-play telecoms services are concerned are intending to release a voice-driven smart speaker known as Djingo. It is an alliance between themselves and Deutsche Telekom but will integrate Amazon Alexa technology. The French will benefit from Djingo in the European Spring of 2019 while the Spanish will benefit later in the year.

On this site, I have called out for the European tech firms to work towards one or more highly-capable voice-driven assistant platform that can effectively compete with Alexa, Cortana, Google Assistant and Siri.

It is also about having the European voice-driven assistant platforms work towards European values such as a competitive market, end-user privacy and service transparency, including having the data kept on European soil.

But the problem with Orange’s and Free’s deployment is that they are implementing Amazon’s technology rather than creating their own technology. This may be to avoid the so-called “Video 2000” problem where Philips and Grundig developed a highly-capable videocassette platform. But this platform, only adopted by some European names, didn’t succeed due to the popularity of the affordable VHS platform. In this case, most of the videocassette recorders based on the Video 2000 platform were sold in to the European markets and most of that platform’s marketing was focused within Europe.

This is compared to a large number of commercial passenger airlines maintaining the European-built Airbus aircraft in their fleet alongside American-built Boeing aircraft.

If a European voice-driven assistant platform is to succeed, it has to be offered around the work as a viable competitor to what Silicon Valley offers but with the values Europeans cherish. This is because there are consumers, service providers and enterprises who also underscore these values and want to benefit from AI-driven voice assistant software.

As I have said before, the European Commission could encourage the development of European-based IT that honours the European values and market it around the world. This is rather than always engaging in court battles and antitrust investigations to deal with Silicon Valley’s market dominance.

Send to Kindle

The successor to the Freebox Révolution has arrived in France

Articles Freebox Delta press photo courtesy of Iliad (Free.fr)

Xavier Niel unveils new Freebox with Alexa, Devialet, Sigfox, Netflix | TechCrunch

French Language / Langue française

Free annonce ses nouvelles Freebox : la Freebox Delta et la Freebox One | FreeNews

Freebox One : pour les accros à Netflix (et c’est tout) | ZDNet.fr

Freebox Delta : voici la box qui doit sauver Free | ZDNet.fr

From the horse’s mouth

Free.fr (French Language / Langue française)

Freebox Delta (Press Release / Communiqué de presse – PDF)

Freebox One (Press Release / Communiqué de presse – PDF)

My Comments

While the “gilets jaunes” were protesting about the cost of living in France, Free.fr had just launched a long-awaited successor to the Freebox Révolution modem-router and media player setup.

The Freebox Révolution was a device symbolic of the highly-competitive telecommunications and Internet-service market that exists in France. It is a xDSL modem-router with an Ethernet connection and a NAS that is also a DLNA-compliant media server. It works with a set-top media player that has an integrated PVR and Blu-Ray player. But over the years, these units took on new functionality that was extraordinary for carrier-provided equipment such as VPN endpoint and Apple AirPlay functionality. Infact I saw it as a benchmark for devices supplied by telcos and ISPs for Internet access when it came to functionality.

Here, there are two systems – one called the Freebox Delta which is positioned at the premium end of the market, and the other called the Freebox One which is positioned as an entry-level offering.

The Freebox Delta has a server unit which combines a modem-router and a NAS that is equivalent to a baseline 4-bay standalone NAS. The WAN (Internet) side can work with a 10Gb fibre connection, an xDSL connection or a 4G mobile broadband connection. But it is the first modem-router that can aggregate the bandwidth of an xDSL connection and a 4G mobile broadband connection for increased throughput.

On the LAN side, there is a Wi-Fi 5 (802.11ac) connection working across three bands and implementing MU-MIMO wireless connectivity. It is in conjunction with an integral four-port Gigabit Ethernet switch. There is the ability to link to the Freebox Delta Player in another room using the FreePlugs which are Gigabit HomePlug AV2 adaptors that Free.fr provides but these are actually network adaptors that use the USB-C peripheral connection approach.

The VoIP functionality that any “box” service offered by the French carriers provides has an RJ11 endpoint for a telephone as well as a DECT base station. There is a USB-C connection along with NFC support.

But Free.fr are even having the Freebox Delta as part of a home-automation system by providing hardware and software support for home-automation hub functionality. It is thanks to Free’s partnership with the Sigfox smart-home software platform. This is based around Zigbee technology with Free.fr and others supplying “smart-home” devices complying with this technology.

The Freebox Delta Player is effectively a connected speaker made by Devialet, a French hi-fi name of respect when it comes to speaker.  But it is a soundbar that uses 6 drivers to yield effectively a 5.1 surround-sound experience.

It works with a French-based voice-driven home assistant (OK Freebox) that handles basic commands but can work with Amazon Alexa which gives it access to the Amazon Alexa Skills library. This is achieved through a four-microphone array and is another way for a European company to effectively answer Silicon Valley in the field of voice-driven assistant platforms.

It can yield pictures to the 4K HDR 10 standard using an HDMI 2.1 socket compliant with the HDCP 2.2 standard and supporting eARC audio transfer that allows for best use with 4K UHD TVs. There is also a DVB-T2 tuner for over-the-air digital TV. You can control the Freebox Delta Player using a wirelessly-charged touchscreen remote which charges on a Qi-compliant wireless charging plate integrated in this media player. Let’s not forget that this device is up-to-date by implementing USB-C peripheral connectivity for two peripherals.

The Freebox Delta will cost EUR€480 to buy, with payment options of  EUR€120 per month over 4 months, EUR€10 per month over 48 months or the full upfront price being paid. The service will cost at least EUR€49.99 per month.

Freebox One press picture courtesy of Iliad (Free.fr)

Freebox One – the entry-level solution

The Freebox One is an entry level single-piece multimedia player and modem-router unit. This will have a Gigabit Fibre and xDSL connectivity on the WAN (Internet) side and Wi-Fi 5 (802.11ac) and four Gigabit Ethernet ports on the LAN side. There will be the DECT VoIP base for the telephony function along with a DVB-T connection for digital TV. It can work with 4K HDR 10 via an HDMI 2.1 (HDCP 2.2 compliant) port for your 4K UHDTV.

It has a front-panel display that is similar to the previous generation of Freebox systems.  You can get this device for EUR€29.99 per month for first year, EUR€39.99 per month as a Freebox hardware-and-services package of the kind you get in France.

With both Freebox systems, I would expect that Free.fr will regularly release new firmware that will add extra functionality to these devices over the years. When you get these “boxes”, you will find that there is more of an incentive to visit the “mis à jour” part of the user interface and frequently update their software.

By offering the Freebox Delta for sale rather tied with a multiple-play service package, Free.fr wants to be able to sell this unit as a device you can use with other services. This means that they can put themselves on the same footing as AVM by being another Continental-European source of highly-capable always-updated consumer premises equipment for your home network.

But what needs to happen is for the European consumer IT firms to create hardware and software platforms that can effectively answer what Silicon Valley has to offer. Who knows which European companies will end up as the “Airbus” or “Arianespace” of consumer and small-business IT?

Send to Kindle