Category: Mobile Computing

Tablet computers – where are they really used and for what

I have read some articles about the new tablet computers like the Apple iPad and the Android-based units. People in the industry seem to pitch them as portable computers that are used as an alternative to a netbook. On the other hand, I read about these computers being used at home as a “lounge-room” computer that is used for Web-browsing, working the Social Web (Facebook, Twitter, etc) or watching YouTube clips.

It is interesting to see what you readers are using these computers for rather than just relying on what the press or manufacturers are running with concerning this class of computer.

Simplifying login and authentication processes for WiFi hotspots

Articles

Wi-Fi body wants hotspots to override 3G • reghardware

From the horse’s mouth

Wi-Fi CERTIFIED™ Hotspot Program to Ease Subscriber Connectivity in Service Provider Wi-Fi® Hotspots  – Press Release

Wi-Fi Alliance Webpage

My comments

One main thrust behind the Wi-Fi Alliance’s new initiative concerning authentication, authorisation and accounting on public hotspots was to permit a wireless-broadband carrier to use Wi-Fi hotspots as a complimentary cellular technology. This is to avoid the need to buy cellular-telephony spectrum in order to increase service capacity and is increasingly necessary as the available radio spectrum becomes increasingly scarce.

Here, a cellular carrier could run their own Wi-Fi hotspot networks like what Telstra is doing or they could form a partnership with a wireless Internet service provider like “The Cloud” in the UK as a way of providing this service. They could then allow for a customer to seamlessly hand over from a 3G network to a Wi-Fi network that supports these credentials.

The way this is going to operate is to use a SIM card in a smartphone to store credentials for Wi-Fi networks. This card is typically controlled by the cellular carrier and may be only used for login credentials that continue the carrier’s partnerships.

A limitation I find with this is that the carrier could implement software locks so that the customer can’t use public networks other than those provided for by the carrier or their partnership. As well, there are other issues that haven’t been looked at properly with this goal for improved authorisation, authentication and accounting on these networks as I list below.

Venue-controlled hotspots

It can also make life difficult for customers who use hotspots provided by venue owners like hotels or cafes. Here, the login experience is typically managed by the hotspot owner and this may require information like a session ID in the case of a hotspot at a bar or cafe, or a room number for a hotel. These may apply for hotspot service where you pay the premises owner for that service or the service is part of the business’s main operation. In some free hotspots, you may have to click on a form to assent to terms and conditions of the service before you continue using the service.

As well, a user could use a hotspot run by an independent wireless hotspot operator and buy their access themselves through a Web-based user interface before using the service.

What I would like to see is support for these kind of hotspots because the user interface that is provided by most of them can become awkward for people who use handheld devices. This is typically because most of these user interfaces are designed for devices like laptops rather than handheld devices.

The improved interfaces could support “app-style” login experiences including “remember-me” login experiences where applicable. Other improvements that could be facilitated include the use of barcodes that are scanned by the phone’s camera to load “session keys” for docket-controlled hotspots or MMS direct-load support for login tokens for “SMS login token” WISPS. It could then lead to a venue-branded experience which some users may find as a “safety net” for their hotspot experience.

As well, a branded experience can be part of a “walled-garden” of sites that a person can visit free of charge or can be a sophisticated experience with such things as an online menu or the ability to order food and drink from your computing device.

Similarly, the idea of “franchising” WISP service to owners of venue-controlled hotspots hasn’t been worked out fully with this technology. Here, a person could have the rights to resell a WISP’s service under varying risk-return models and have the clients associated with that service use their hotspot in exchange for a cut of the costs paid by the clients.

Selective device-cluster creation

It is also a preferred standard to have devices in a public network isolated at lower network levels in order to prevent unwanted peer-to-peer discovery of the devices on these networks. This is typically achieved through functions like “AP isolation” or “Wireless Network isolation” and makes it appear to the devices that they are connecting directly to the Internet privately.

There are situations where a person may want to provide local connectivity between their own devices or devices owned by other users that are in their trust circle. Examples of this include LAN-based gaming over a wireless hotspot network, workgroups sharing data during a cafe meeting; one shifting data between a smartphone and a tablet computer at a coffee lounge or simply uploading pictures from a Wi-Fi-enabled camera to a 13” traveller laptop at their favourite “watering hole”.

Here, the authentication needed for this could be achieved through “same-token” login for devices with integrated Web browsers to entry of MAC addresses or WPS PIN numbers into a “cluster-creation” screen provided by the hotspot gateway. The Wi-Fi Alliance could examine the feasibility of using the new authentication methods as a way of creating selective network clusters across a device-isolated public wireless network.

Authenticating hotspots at the SSID-discovery level

The other question that has not been answered as far as I am concerned is whether there will be a system for authenticating hotspots and public networks in a similar manner to what is done when a user logs on to a banking site for example. This is to verify that the user has discovered a “safe” network before they select that SSID and begin to login to the hotspot.

The data that would be verified would be the MAC addresses of the access points as well as the gateway device’s  IP address and MAC address. This can be used to verify that the user has logged in to a network that is operated by the venue that is providing the hotspot service. For a WISP like “The Cloud” or FON, this may be useful for verifying that users have logged in to the WISP’s network. In this case, this information may pertain to the locally-installed hardware for the WISP.

Here, this could be achieved through a private-key / public-key exchange setup where the successfully verified hotspots could at least be highlighted in a wireless network with a ?key” or green-light icon. If this system does also support the transmission of logo icons, the client device could also show a company logo for that hotspot host.

It can also work as a way of encouraging customers to be sure of where they are surfing the Web through. As well, a business could have a Windows 7 laptop or Blackberry smartphone that supports this kind of verification for public wireless networks to prohibit logging in to public wireless networks that don’t have this kind of verification.

The main issue with this is that independently-run cafes and bars may need to be able to have access to any certification setups at a modest price, preferably through a government business-support agency or their bank.

Conclusion

Once these issues are ironed out concerning the provision of public Wi-Fi Internet service to the hordes of users with notebooks, netbooks, smartphones and tablet computers, then they can use these services to full capability in a secure manner.

CEBit 2011

The CEBit trade fairs are becoming a bit of a quandery when it comes to being a European launch platform for IT products targeted at the home and small-business user.This is because most of these products appeal as a crossover product between something destined for the householder and something destined for a business owner or manager.

It also cements the fact that products destined for household use like most wireless routers, smartphones and consumer laptop computers will typically end up being used in the shop or small office even though these places will use equipment targeted at business use.

Here, some of these IT product ranges could be launched in Europe at this show whereas others could be launched at the Internationaler Funkaustellung in August.

Main trends

Tablet computers

The core trends that I have observed concerning CEBit 2011 have been the tablet computers. This fair has become another launch platform for manufacturers to promote their new tablet computers which are primarily based on the Android operating platform.

Key improvements for this class have been the use of dual-core processor technology which yields faster performance.

For this class of device, this show has come at the same time Steve Jobs was premiering the Apple iPad 2 and it shows how competitive the market for tablet computers will be.

CPU/GPU combo processors

The general-purpose computing market has been thrown in to a state of flux with Intel and AMD launching processor platforms based around CPU/GPU combo processors in the form of Sandy Bridge for Intel and APU for AMD. This has changed the ballpark when it comes to integrated graphics solutions with this class of graphics solution yielding graphics performance that is above what is expected.

Similarly, NVIDIA have put forward an ARM-based CPU/GPU combination which would require a different software architecture. This has caused Microsoft to consider releasing the Windows Platform for the ARM architecture as well as for the Intel Architecture.

These processor designs have opened up a new class of computer with “superslim” notebook / laptop computers as well as more of the low-profile ultracompact desktop computers and all-in-ones. The recent work on “dual-mode” graphics where there is a discrete graphics chipset as well as integrated graphics in a computer design has become of benefit when it comes to balancing power economy and performance by allowing the discrete graphics to be seen as an “overdrive”.

Network Devices

The main trends here concern LTE wireless broadband as a WAN option for routers as well as speed increases for the popular no-new-wires network technologies. The 802.11n Wi-Fi network had been brought to 450Mbps in the form of a three-stream variant known as N450. The HomePlug powerline network had been brought up to 500Mbps but this is not yet a defined standard until HomePlug AV2 is “set in stone”. Still, this show has become a European premiere for these networking technologies.

It is more so as more European countries have deployed or are deploying next-generation broadband service to homes and businesses across the continent. What with VDSL2 projects occurring in the Germanic countries (Germany and Austria) and parts of the UK as well as various FTTH fibre-optic projects in the UK and France.

Computing Devices

Tablets

Google have released the 3.0 “Honeycomb” version of the Android operating system but have pitched it at the tablet computers rather than at smartphones and tablets. This has come at a time when more manufacturers were releasing tablet computers to the general market.

There are two main screen sizes being released – a 7” size that can be put in a coat pocket as well as a 10” size that is similar to the iPad and most netbook computers.

ASUS had launched their eeePad range of tablets with three notable devices. One is the eeePad Memo which is a 7” screen unit that is driven by a SnapDragon processor and can be operated with a stylus rather than the finger. Another unit of note has been the eeePad Slider which looks like a smartphone and has the expected functionality but can run on its batteries for 8 hours at a time. As well, ASUS premiered the eeePad Transformer which has a detachable keyboard for those who prefer to type.

There have been a few “budget” tablets that are driven by Android 2.1 rather than 3.0 and are pitched as entry-level e-reader tablets. One 8” model was pitched by AOC and had no integrated wireless-broadband modem and had 4Gb of onboard memory; while there was another 7” unit pitched by Archos in the form of the 70b E-Reader.

Of course, a few “iPad slayers” had been launched at this show. These units which are close to 10” for screen size have features, options and performance statistics that could offer more value than an equivalent iPad.

Fujitsu had released a “Slate” tablet with two cameras and could work with an optional desk docking station so that one could use standard computer peripherals like a keyboard or printer. They also fielded a Windows 7-powered “business-class” tablet PC for the corporate end of the equation.

Now, no tablet computer launch would be without the “Second Japan” (South Korea) putting their weight in with their high-value equipment. LG had launched the G-Slate which is an 8.9” Android 3.0 tablet powered by a dual-core processor, NVIDIA Tegra 2 graphics. This unit has 32Gb on-board, as well 2 cameras that are capable of 5 Megapixels each. Samsung has used this show to launch the Galaxy Tab 10.1. This is a 10” Android 3.0 tablet that uses a dual core CPU and NVIDIA Tegra 2 graphics.

Smartphones

This has also become the time when Google had set the Android 2.3 “Gingerbread” version in stone. As well, there had been talk of Nokia wanting to shift from Symbian to Windows Phone 7 for their smartphone platform.

Dell had put their foot in the market with the Venue Pro which is a Nokia-style smartphone with a slide-down keyboard.

Nokia have premiered two keyboard-enabled touchscreen smartphones in the form of the Nokia N7 and N9, with the latter one being at least Meego driven. They are also wanting to move towards Windows Phone 7 and away from Symbian as the smartphone operating system of choice for their smartphones.

Samsung have taken the chance to premiere the Galaxy S2, which is the successor to their highly-popular Galaxy S. This smartphone is equipped with a Super AMOLED display and runs Android 2.3.

Desktop and Laptop Computers

The Windows-7 computers become more powerful in their beauty and function. As well, the new combined processors in the form of the Intel Sandy Bridge and the AMD APU systems have opened up new paths when it come to designing desktop and laptop computers. Here, portable computers have been able to perform better than expected for most graphics tasks and are able to do this without a penalty on battery runtime. As well, manufacturers have been able to consider designing desktop computers that are small neat and elegant units yet able to perform remarkably well.

ASUS have released three notebooks that are of note here. One is the eeeSlate EP121 convertible notebook which has a touchscreen and a supplied Bluetooth keyboard. The screen size is 12” and it is powered by an Intel Core i5 processor. Its secondary storage comes in the form of a 64Gb solid-state drive.

They have also released the VX7 15” laptop which may impress regular “Top Gear” viewers. It has sports-car styling and uses dual-mode graphics in the form of NVIDIA GEForce GTX460M for discrete-mode and Intel Sandy Bridge Core i7 processor for integrated mode. As well, they have released a notebook computer which is 19mm thick. Here, I don’t have information about its full specifications.

Dell have run with a convertible laptop in the form of the Inspiron Duo. Here, this machine’s screen swings in a frame to “filp” from a regular laptop to a tablet computer.

Acer have premiered the iconia which is a dual-display laptop which uses two touchscreens with one as a keyboard. They have also shown the Revo multimedia desktop PC which I would describe as very similar to the slim version of the popular Sony PlayStation 2 games console. As well, Shuttle, a manufacturer of small-form-factor PCs have released a computer that is based H67 “Sandy Bridge” chipset.

Peripherals

The computer display scene has been centred around large-screen HD monitors. One of these is in the form of the ASUS P246Q 24” LCD screen for graphics artists. This one could work in landscape or portrait mode, has an A4 aspect ratio, and a resolution of 1920×1080. For connectivity, this 499-Euro display has the DisplayPort, HDMI, DVI and “VGA” connectors as well as an integrated USB hub.

BenQ have offered a 24” Full-HD LED-backlit LCD display This 300-Euro display has for connectivity 2 HDMI sockets, and a 4 USB hub as well as the usual DVI and VGA connectors but could offer a DisplayPort connector. They also released an “interactive projector” that needs no stylus and allows the user to touch the projected image to interact with it.

Creative have released a few HD-resolution webcams in the form of the Socialize HD which is equipped with auto-focus and available as a “full-HD” (1080) model and an “HD” (720p) model/ They have also released the “Cam Chat HD” which doesn’t have auto-focus but works at HD (720p).

Every technology trade show will come up with the usual line of peripherals and gadgets that may not appeal to the serious computer buyer but appeal to the computing press as sidelines. One is that Fujitsu had released a regular computer mouse that was to “appeal” to the green thought by having it made out of renewable materials. In my opinion, this wasn’t anything special as far as pointing devices go.

SAGEM had released a cordless phone which reminded me of one that was released in the late 1970s by a mail-order firm in America. Here, the battery-powered cordless phone was designed like a standard corded desk telephone yet it transmitted via radio to a “black-box” base station that was connected to the telephone service. It was initially modelled on the standard-issue dial telephone of the day but was revised to look like the standard-issue pushbutton phone of that same era. The cordless phone offered by SAGEM and known as the “Grundig Sixty” was styled like a dial-equipped desk telephone that was standard-issue in Germany in the late 1960s except that this DECT-connected phone uses pushbutton dialling and is finished in that orange colour reminiscent of the era.

The network

For the network, this has become a European launch pad for N450 (three-stream 802.11n that runs at 450Mbps maximum) Wi-Fi equipment as well as 500Mbps HomePlug AV equipment.

AVM, the German network-hardware name have become an example of this with their FritzBox routers have been conservative with their N-based WiFi speeds by offering N300 for their Wi-Fi networks rather than running for the N450 three-stream technology. One of these is the FritzBox 6840 which has LTE wireless-broadband on the WAN side and one Ethernet as well as Wi-Fi N-300 on the LAN side. Like most of the other FritzBox routers, it has VoIP telephony interfaces through 1 telephone socket and a base station for 6 DECT handsets. As well, it has a USB socket for sharing peripherals as well as being a DLNA media server.

They also premiered the Fritzbox Fon WLAN 7330 which has ADSL2 on the WAN side and Gigabit Ethernet as well as Wi-Fi N300 on the LAN side. This would have the USB port and DLNA media server function as well as a VoIP endpoint for 1 regular handset and 6 DECT handsets.

They also released a companion DECT cordless handset for these routers which looks as though it is a low-tier camera-equipped mobile phone. Here, this would use a colour LCD display and a graphic user interface for its management and use; and is pitched as an Internet audio endpoint.

Of course, they have released a HomePlug AV 500Mbps set with two HomePlug-AV – Gigabit-Ethernet bridges for the European market.

TP-Link have started to push in to the European market as far as their HomePlug products are concerned, This is with them premiering an energy-saving HomePlug AV network bridge with power connector so you don’t lose your power outlet when you plug in the HomePlug.

Conclusion

The CEBit 2011 trade fair is the first such fair for an interesting year in information technology, what with combo CPU/GPU chips, higher network speeds and increased interest in the touch-driven user interface.

What about having IMAP4 as a standard email protocol

Introduction

Most email services, especially those offered by consumer ISPs, use the old POP3 / SMTP protocols as the backbone for their email services. This works properly when only one computer is working as an email client because there is an expectation for the email to be downloaded off the mail server to that one computer.

Now the reality has changed due to Moore’s Law allowing for the ISP to offer email storage capacity to their customers in the order of gigabytes. As well, the computing paradigm has shifted towards people viewing their email from multiple devices. This has been brought about with small business owners having an office computer and a home computer, as well as the increasing popularity of smartphones, tablet computers and secondary-tier notebook computers like netbooks and 13”-14” ultraportables.

What does IMAP4 offer over POP3?

The IMAP4 technology requires email to be stored on the server and allows a copy of the mail to exist on the client devices. When the email client connects to the IMAP4 server, it simply synchronises all the email between the client and the server. This includes synchronising the client outbox to the server outbox in order to have emails being sent.

There is the ability for an IMAP4 setup to support “header-only” downloading, which would be of importance to people who use portable devices or low-bandwidth connections. As well, an IMAP4 setup can allow the user to operate in “offline” mode where synchronising is done when the user explicitly goes online so that users can prepare their email where Internet access is unavailable but synchronise when it is available.

Compared to POP3 / SMTP, this allows for increased flexibility when it comes to maintaining a mailbox from different email clients. Primarily, the contents of the same mailbox appear in all client devices that can access that mailbox. An example of this benefit would be that the Sent folder contains all messages that are sent from all of the clients rather than from that particular client. Similarly, one could “rough-out” an email using a smartphone or other portable device, then “finish it off” on the desktop because the email will be held in the Drafts mailbox folder.

It also supports the ability to create mailbox folders which will allow you to file the email in a manner that suits you, yet see the same filing arrangement across all your client devices.

It is also worth knowing that IMAP4 is the basic email protocol that OMTP have called as part of their standard for mobile “visual voicemail” services. These services allow a user to manage voicemail that they receive on their mobile phone in a similar manner to how they manage email on their computer or smartphone.

The status quo with IMAP4

IMAP4 is a free open-source technology that is independent of any licensing requirements; and nearly all email clients for desktop and mobile operating environments offer IMAP4 support as standard.

It is even though most of the consumer ISPs don’t offer it as an email protocol to their customers. This is while an increasing number of these providers are now offering mailboxes with gigabyte file capacities to new customers and upsizing existing customers’ mailboxes to these capacities. As well, the current range of data-centre equipment that works as mail servers can handle IMAP4 easily.

Some of these providers would rather offer a “hosted Exchange” service which would require the user to use Microsoft Outlook in Exchange mode. These services are more expensive to provide and may cost more for most personal and small-business users.

What could be done

An Internet service provider could offer IMAP4 mailboxes as a standard option for new customers or customers opening up new mailboxes. As well, they could offer it as a free upgrade option to existing customers, with information on how to convert from POP3 / SMTP to IMAP4.

This kind of setup that IMAP4 offers can allow telcos who offer Internet service and telephony as a bundle or triple-play services to provide a unified messaging environment where customers can manage their voicemail, fax and email from the same terminal. It also opens up ways for these companies to add value to their telephony and Internet services.

It also is a way of supporting the Internet-usage reality which is a reality driven by multiple-computer setups and portable computing.

At last a free iPhone app for controlling the UPnP AV / DLNA Home Media Network

Links

Bergin-IT Gizmoot

Direct link to iTunes App Store

My comments

This happens to be the latest DLNA controller program for the iPhone or iPod Touch and is available for free from the iTunes App Store. This program also is ad-supported through the iAd network that exists for iOS software. At the moment, it isn’t designed to work well with the iPad.

The functionality is basic in that it allows you to browse your media on a DLNA (UPnP AV) media server and have it play on a DLNA (UPnP AV) Media Renderer. This would be considered basic compared to the likes of PlugPlayer in that it wouldn’t allow you to play the media from the Media Server through the iPhone, nor would it support downloading or uploading between the Media Server and the iPhone’s local storage.

It can support playlists and slideshows so you can have your Samsung TV or WDTV Live run a sequence of media under the control of your iPhone.

I would still recommend this app for people who want to get going with UPnP AV / DLNA “three-box” setups and they have equipment that can be controlled through a UPnP AV / DLNA control point. This would be more so with network AV media adaptors which you want to press in to service for audio playback and you don’t necessarily need to have the TV on so you can select music to listen to. You may even think of using this program with that iPod Touch or iPhone 3GS that you have set aside because you have moved to the ultra-cool iPhone 4, so that the old phone can be part of the DLNA Home Media Network.

The arrival of 4G wireless broadband–what does it mean for Next Generation Broadband

Article

Telstra super-fast 4G wireless sparks debate over NBN

My comments

As many countries agressively build out fibre-optic-based “Next Generation Broadband”, there is also the reality that companies involved in wireless broadband will deploy LTE or WiMAX “4G” technologies for this service.

This issue has been raised recently as Telstra, Australia’s incumbent telephone and mobile carrier announced its intention to deploy LTE-based 4G wireless broadband. This is even though the Australian Federal Government were rolling out the National Broadband Network, which is the next-generation broadband service based primarily on “fibre-to-the-premises” technology.

A key issue that have been raised include the “all-wireless” household or small business, which doesn’t have a landline telephone or ADSL/cable-based broadband Internet for their telecommunications. This may be implemented by students and similar households where each user wants control over their communications costs as well as assuring proper service privacy.

Issues of comparison

Value of service as a primary Internet service

A common disadvantage with this kind of setup is that the bandwidth available to the user from a wireless broadband service is less than that for a wireline broadband service like ADSL, cable or fibre-optic. As well, the wireline service is typically able to offer better value service than the wireless service. This disadvantage may be eroded if the 4G wireless broadband services are priced aggressively against the Next-Generation-Broadband wireline services.

Reliability and Stability

Even so, the 4G wireless broadband setups won’t yield the same bandwidth as a next-generation broadband setup; and these systems are based on radio technology which can be affected by many factors such as  the environment surrounding the radio equipment, the aerial (antenna) that is used as part of the equipment and the calibre of the equipment itself.

Examples of this include wireless-broadband modems used in double-brick / cinder-block buildings; equipment like USB modem sticks designed to be compact therefore not having adequate aerial systems; and simple weather conditions that affect wireless performance.

Here, this could lead to inconsistent performance for 4G wireless-broadband setups, with results like stuttering during VoIP telephony or multimedia playback.

Multiple device setups

No-one has yet raised the issue of a person operating multiple devices that connect to wireless broadband Internet. This is a common reality as people buy smartphones, tablets and netbooks that have integrated wireless-broadband connectivity. Here, these devices are operated on their own services and it requires users to keep track of the many accounts and bandwidth allowances that each device has.

As well, the wireless-broadband technologies discourage the idea of establishing local-area networks which could permit bandwidth sharing / pooling or sharing of resources like printers or file directories. Here, the users would end up not creating a local area network at all, and may just end up using technologies

Political issues peculiar to the Australian scenario

I also see certain political issues in the “next-generation-broadband vs 4G wireless broadhand” issue more so in Australia. Here, the Australian Labour Party see the National Broadband Network as a tool for nationalising or “claiming back” the wireline telephony infrastructure that they relinquished when Telstra was privatised. Here, Telstra, like British Telecom was originally part of the government-owned “Posts, Telegraphs, Telephones” department and became its own telephony entity as this department was separated.

There hadn’t been any mentions of intent to nationalise the Telstra-owned wireless infrastructure used for reselling their mobile telephony and wireless-broadband service. As well, Telstra were wanting to set up the aforementioned 4G LTE wireless-broadband technology on this infrastructure as a retail service and the Australian Labour Party were seeing this wireless-broadband service as a broadband service that competes with their National Broadband Network.

How I would see this argument is a way of seeking legal authority to require Telstra to do a “BT-style” sell-off of its mobile-telephony and wireless-broadband business. This is where they would be forced to divest themselves of the infrastructure and retail mobile-telephony / wireless-broadband business to another service

Conclusion

How I see the role of any wireless-broadband technology is that it is a complementary technology to a wireline technology rather than a competing technology. It exists primarily for mobile, portable and temporary computing applications.

PS. If I am appearing to write this article in a manner that supports Telstra, I have no pecuniary interests in this telecommunications company other than to be a regular customer of its telephony services.

New changes coming ahead for the handheld PlayStation Experience

Articles

Sony’s official NGP announcement video hits the web | Engadget

PSP Reborn: The Quad-Core Next Generation Portable (NGP) | Sony Insider

Your Guide To The Sony Next-Generation Portable | CNET Crave

Sony annonce sa "3DS killer" | TF1.fr (France – French language)

My Comments

Sony have implemented a few changes for the PlayStation Gaming Platform which will be affecting this platform as a handheld-gaming platform. What they have realised is that the PlayStation Portable or PSP has reached its peak and is facing competition from the iOS and Android mobile devices when it comes to handheld gaming.

NGP – Next-Generation Portable

This console, which is intended to be the successor to the PSP has also been rated as a a “Nintendo 3DS-killer” according to TF1 in France.

It has a 5” AMOLED touchscreen but there are still the control buttons that eager gameplayers can keep “mashing”; as well as two analogue joysticks for its control options. Like the iOS and Android devices, there will be support for sensors. These will be in the form of a GPS, gyroscope and accelerometer as well as a front camera and a back camera as well as rear touchpads.

All these sensors are there to permit “augmented reality” and other enhanced gaming experiences. Examples of this included looking around sports-type games in a first-person form such as looking around a pool table or golf tee before hitting off that shot.

The gaming performance has been improved over the PSP with use of a quad-core Cortex A9 processor, 512Mb RAM and PowerVR SGC 543 MP4+ graphics subsystem. This then can allow for some of the more heavier titles that will appeal to a lot of the players.

This console will have network connectivity in the form of Bluetooth and Wi-Fi. But there will be versions that will come with 3G wireless-broadband technology, in a similar vein to the smartphones and tablet computers.

I often wonder whether this connectivity will allow for more than downloading of games and extras from the PlayStation Store or playing games via the the PlayStation Network. The applications that I am thinking of include peer-to-peer gaming; interaction with the DLNA Home Media Network or interoperability with the PS3 games console.

The storage in this console consists of an SDHC card slot for user-data storage as well as 16Gb on board/ But Sony are also using a new flash-memory-based cartridge format for distributing pre-packaged games.

As far as games availability goes for the initial run, most of the games that are available for the PS3 are intended to be ported to this console. It will be interesting to see what games will take advantage of the touchscreen and the sensors that this handheld has.

I also wonder whether the games will make use of the relatively-large choice of user interfaces that this console offers such as the buttons and joysticks, the touchscreen or the sensors. This is whether as alternative interfaces or as interfaces that are particular to the game or part thereof.

PlayStation Experience for Android – PlayStation Suite

As well, Sony intend to bring out a “PlayStation Suite” app for certain Android phones so that these can be played like the PSP or the NGP. The big question that I have about this is which phones will be able to run this software and whether there will be the full range of games on this platform. This could certainly put Apple on notice when it comes to the smartphone as a gaming platform, because of the PlayStation platform’s prowess with the advanced games like the Final Fantasy series of adventure games.

At the moment, this PlayStation Experience will be limited to an emulator which will be used to play the games that existed for the original Sony PlayStation console.

Conclusion – What could happen to the PlayStation brand?

The introduction of sensors and touchscreens to the PlayStation Experience could allow Sony to add extra dimensions to the games available for this platform and use the PlayStation name as a reference point for console and mobile gaming. Who knows whether Sony will extend this brand to premium Windows and MacOS X games that are meant to be played on those “gaming rigs”?

What is the “new computing environment” and how to go about it?

When I talk of laptops, wireless routers and network-capable printers, I make frequent references to a “new computing environment” that these devices can enable.

What is the “New Computing Environment”

Sony VAIO E-Series laptopThe “New Computing Environment” is a home computing environment that is based around portability and flexibility. The seed for this environment has been sown with the widely-publicised Intel Centrino campaign and is becoming stronger in a lot of households.

It consists of most of the computers in the house being laptop or notebook computers.It may also include the use of “all-in-one” desktop computers similar to the newer Apple iMacs or HP TouchSmart desktops. The goal is that these computers are able to be moved easily around the house at a whim.

This environment will also encompass the use of smartphones and tablet computers for secondary computing activities like casual Web browsing, email and use of social networks.

There is a Wi-Fi home network in place that is served by at least a wireless router that is the network’s Internet “edge”. The computers may connect to that router via Ethernet if they are close to it but are typically connected to that router using the Wi-Fi network segment.

What does this lead to

Increased flexibility

The key benefit is to increase flexibility when it comes to computer use. The major benefit is that you can relocate the computer as you need it. An example that was portrayed in an Intel Centrino radio ad that was played in the UK was someone who was writing out an email on a laptop being being interrupted by another household member who had come in to do the vacuuming. Then they are able to move somewhere quieter to do the rest of their work.

Netgear DG834G ADSL2 wireless router

Netgear DG834G ADSL2 wireless router

As well, the “New Computing Environment” also leads to increased “casual computing” setups like viewing sites like YouTube or Facebook while lounging around on the sofa; going through one’s email while relaxing in bed or flicking through online news sites while in the kitchen. I even wrote a short article on this site about the trend of young people visiting Websites while watching TV.

Catering to temporary workspaces

Another very common scenario is a household without a dedicated workspace. This is where the kitchen bench or the dining table becomes a temporary office. Some households may have a collapsible table like a card table or trestle table along with one or more folding chairs, set up in a lounge area or landing for use as a temporary workspace; or may have such furniture on hand to set up a temporary workspace as required. The “New Computing Environment” allows the user to shift the computer along with the rest of their work whenever they need to do something like set the table for a meal.

Even if a household has a dedicated workspace, there will always be the need to create another temporary workspace to suit another person’s work or study needs or to suit a different type of work.

Storage flexibility

Similarly, laptop computers are much easier to store when not in use. For example, they can be put in a drawer when not needed, as I have mentioned in an older article regarding use of a laptop as a kitchen PC. This allows the machine to be well out of harm’s way which can be of concern in a busy household or with some children and pets.

As well, the laptop is also more suited to households who have older “davenport” or “roll-top” desks which are capable of being closed up when not in use. Here, these computers can be used at and stored easily in these desks. It also allows these desks to become the elegant piece of furniture that they are known for.

Suitability with “downsized living”

This computing environment is becoming increasingly relevant with people who live in smaller houses and apartments; especially city apartments.

This class of user includes “empty-nest” parents who are moving to smaller premises because their children have left the family home, but still need to be able to look after their grandchildren when they come around.  Here, their computing equipment doesn’t need to cause much space to be taken up in these smaller living quarters.

The “home-business” laptop

This kind of computing environment also suits the use of a “home-business” computer that is used at home but taken to the workplace while you are working. For some small-business operators, a large laptop like the Dell Inspiron 15R or the HP Probook 4520s may be the only computing device that they need to use for all their computing needs and you just pack this machine in the boot (trunk) of your car before you head to or from your workplace.

Implementation notes

Starting out

You will need to use a laptop computer that is commensurate to your computing needs. But it will have to be equipped with an integrated Wi-Fi wireless network interface of at least 802.11g WPA standard. This covers most laptops made over the past five years. I have reviewed plenty of laptops and notebooks on this site and will be reviewing more of them as they come along from different manufacturers. You can have a look at the list of equipment reviewed here on this page.

Compaq Presario CQ42

Compaq Presario CQ42 entry-level laptop

If you are intending to buy a new laptop computer, I would suggest that you look at the buyer’s guides that I have written – “Buying a Laptop or Notebook Computer”. Here, I have suggested the use of the 15” laptop computers as a sole or main computing device for this environment. If you have very basic needs like emailing and basic Web surfing, a unit equipped with a low-end processor and around 2Gb memory, like the Compaq Presario CQ42 that I have reviewed here, can suit your needs here. It is still worth it to spend as much as you can afford on the hard disk capacity because as you use the computer more regularly, you will end up filling the hard disk more quickly.

On the other hand, you may want to use an “all-in-one” desktop computer like one of the Apple iMac, HP TouchSmart Desktop or Sony VAIO J or L Series computers. These have the computing power, secondary storage and the screen integrated in one slim lightweight housing, with a separate keyboard and mouse. They may be useful as a “common” or “family” computer and can be stored or moved easily as long as you know how to reconnect the keyboard and mouse.

Printers

A lot of people who set up for the “new computing environment” typically use a direct-connected printer and bring the laptop closer to it in order to plug it in when they want to print or scan something.

Canon PIXMA MX-350 network multifunction printer

What you need to do for proper implementation is to use a network-enabled printer. Here, these printers connect directly to the network either via Ethernet or Wi-Fi wireless and accept their print jobs through this connection. Multi-function printers can also expose their other functions like the scanner, fax or memory-card slots to the network.

This avoids the need to connect the laptop to the printer every time you want to print something out. With a network printer, you just select that printer from the list of printers when you specify a print job from your laptop and, moments later. you will find your print job in the printer’s output tray. Here, the job is sent via the network to the printer rather than via a cable that you always connect to the printer.

“Easing the gap” towards flexibility

Some users who are used to a regular laptop computer connected by Ethernet to a single-port broadband modem at a regular workspace may still get in to the habit of connecting the laptop to the wireless router using the “old way”. This is more so if they see their computer’s home location as being on the desktop near the router and while at that location they plug it in to the Ethernet socket on the router.

Some operating systems may react in a strange way if the user plugs in the Ethernet connection while the wireless connection is still active. This may be not of concern with newer operating systems that can automatically deactivate the Wi-Fi wireless network interface if the computer is connected to the network via an Ethernet cable.  Here, the user needs to know how to manually enable and disable the Wi-Fi wireless network interface in the laptop.

Some of the computers will use a separate “Wi-Fi” button to turn the Wi-Fi modem on an off whereas more recent examples will require you to press the “Fn” key and a function key with a transmitter symbol to turn the wireless network on and off. This function may also be known as a “flight mode” and in some cases, will turn the Bluetooth function on and off at the same time.

Then what you might end up doing is to forget using the Ethernet cord and just use the laptop wirelessly as you realise you can use the Internet at home without wires.

Network-attached storage devices

If you are considering expanded or secondary data storage space for the “New Computing Environment”, you will be interested in buying a network-attached storage device. This is a dedicated external hard disk that is accessible from computers connected to your network. It is different to the idea of repurposing an old desktop computer as a shared storage server because the device is designed specifically to be a storage device and will end up being quieter, more efficient and more reliable to run than the old desktop computer.

They are relevant as a backup device; to offload rarely-touched data from your computer and/or to works as a standards-compliant media server for your music, digital pictures and videos. I have touched on this latter application in the DLNA Home Media Network series article: “Setting up for PC-free operation”.

An increasing number of wireless routers are offering NAS functionality when a USB hard disk is plugged in to them. This may be good for starting out or a temporary network-storage solution but a dedicated network-attached storage device can do the job much better for long-term use. As well, most of the routers that offer this function are very under-powered when it comes to handling USB hard disks and you would then have to use a self-powered USB hard disk or connect the “power” USB connection on small USB-powered hard disks to a powered USB hub.

Is wired technology relevant to the New Computing Environment

There are some cases where wired-networking technology is relevant to the New Computing Environment. One main case would be to support network printers or networked AV devices that don’t have integrated Wi-Fi functionality. This would be more so as you consider purchasing an Internet-enabled TV or Blu-ray player for your home and a lot of these devices may just have an Ethernet socket rather than Wi-Fi connectivity.

Another case would be to use a secondary access point to extend wireless-network coverage, such as with buildings that use thick walls made of brick, stone or similar materials; large buildings or outbuildings on a property.

Here, you may think that you have to lay Ethernet wiring through the premises and this may be expensive and of poor value if you aren’t renovating, extending or rewiring your building. In most cases, you could use HomePlug AV technology as your wired “no-new-wires” technology because this uses regular AC wiring as a data carrier.

Conclusion

What I am hoping to do with this is to explain the “New Computing Environment” that is becoming a major trend as far as home and small-business computing is concerned. This is where the computing environment is centred around the use of portable computers that connect to a wireless network.

Mobile Users Becoming More Susceptible to Phishing Scams

Article

Mobile Users More Susceptible to Phishing Scams – www.enterprisemobiletoday.com

My comments

Why are mobile (smartphone and tablet-computer) users more susceptible to phishing scams?

The main reason is that the operating interface on the mobile computing devices is totally different to the operating environment on a desktop or laptop computer.

One main reason is that most of these devices don’t have a large display area in their Web browsers or email clients due to them having smaller display screens. This leads to the software designers designing a “clean and simple” user-interface for software pitched at these devices with minimal controls on the interface; which eliminates such concepts as fully-qualified email addresses and URLs. A lot of these devices even conceal the address bar where the user enters the URL of the page to be visited unless the user directly enters a URL that they intend to visit. Similarly, the email client only shows the display name for the incoming email, especially in the commonly-used “list-view”.

It is also augmented by the lack of a “B-option” interface in a mobile operating system. This is compared to what is accepted in a desktop operating environment with functions like right-clicking with a multi-button mouse or using Ctrl-Click on a single-button-mouse-equipped Macintosh to gain access to a context-sensitive secondary menu. Similarly, all scientific calculators used an [F] key and / or an [INV] key to modify the function of formula buttons either to gain access to the inverse of a formula or obtain another formula.

Such an option would allow the user to select a “function” button before selecting the option or displayed item in order to open a context-sensitive secondary-function menu or select a secondary function.

This discourages users from checking the URL they intend to click on in an email or the fully-qualified email address for an incoming email.

What could be done?

The Web browser and email client could support “phish detection” which could provide a highly-visible warning that one is heading to a “phishy” Web site or receiving a suspicious email. This function is just about provided in every desktop email client that most of us use but could be implemented in a mobile email client. Similarly, an email service could integrate filtering for phishy emails as part of its value-added spam-filter service.

There could even be the ability to have a “magnifying glass” touch button on the browser or email-client user interface which, when selected before you select an email address or URL, would show the fully-qualified email address or URL as a “pop-up”. This would have the domain name emphasised or written in a distinct colour so you know where you are going. This same interface could also be in place if one enters a URL directly in to their Web browser.

The mobile browsers could also support the Enhanced Validation SSL functionality through the use of a distinct graphic for the fully-validated sites. As well, a wireless-broadband provider or Wi-Fi hotspot could offer a “phish-verify” proxy service so that users can see a “red flag” if they attempt to visit a phishy Website similar to what happens in Internet Explorer when a user visits a suspicious Website.  This is similar to how some mobile providers warn that you are heading to a website that isn’t part of their “free-use” Website list and they could integrate this logic in to these proxy servers.

Conclusion

In general, the industry needs to look at the various user scenarios that are or are likely to be in place to improve secure Web browsing and email. Then they have to enable user-experience measure that can allow the user to verify the authenticity of Websites and emails.

This is more so as the small screens end handheld devices end up as the principal Web user interface for people who are on the move. It will also become more so as the “10-foot” TV interface, with its large screen with large text and graphics, D-pad navigation technique and use by relaxed and mostly-tired viewers relaxing on comfortable furniture becomes a mainstream “lounge-room” interface for the Web.

A fully-fledged Skype client for the iOS at last

Articles

Skype adds video calls to iPhone app | The Register (UK)

Skype offers iPhone video calls over 3G | The Register (UK)

Skype: Update bietet Videotelefonie via iPhone und iPod touch | Computer Bild (Germany – German language)

My comments

There have been previous versions of Skype released for the iPhone but these have been limited in functionality compared to the desktop Skype clients. In some situations, you couldn’t use Skype with the 3G wireless-broadband connection and you didn’t have video calling.

Now Skype have delivered Skype 3.0 for Apple iOS which yields a client that does what is expected of the service. Unlike Apple’s FaceTime videophone client which only works with Apple’s platforms, this client can communicate with an established universe of Skype desktop, mobile and dedicated communications clients as well as make and take calls to and from regular telephone services using the paid SkypeOut and SkypeIn services. The software also allows the iOS user to join in or create a video-conference between multiple participants.

You can use this client in a Wi-Fi network or with 3G but you will need either an “all-you-can-eat” data plan or a data plan with a generous data allowance to gain best value when using 3G.

There are some other caveats that can affect user experience. If you run this program on an iPad or older iPod Touch devices, you will be able to see your correspondent’s video but they won’t be able to see you. This is because these devices don’t have an integrated camera. As well, if you use the ubiquitous iPhone 3GS, the experience won’t be as good because of its slow processor and the absence of a front-facing camera.

As well, I would recommend using the phone on “speaker phone” or using a wired or Bluetooth headset when engaging in a videocall so you can see the other party on the display.