Google to use the Chrome platform to build a TV-hosted photowall

Article

Turn Your TV Into An Interactive Scrapbook With Chrome Photowall | Fast Company

My Comments

Media contents in Dropbox folder available on DLNA-capable Samsung smart TV

With Google Chromecast, a smart TV could become a photowall

A friend of mine who likes “scrapbook walls” as part of parties or as a way to represent their children growing up. She typically used A0 or A1 sheets of card to either glue cutouts of photos or even pinned one of these sheets up on a wall during her 21st so people can leave messages wishing her happy 21st birthday.

Google has taken this further by making the TV screen become a photowall using a Chromecast “server” app alongside client apps for iOS and Android mobile platforms and a Web page that is part of the server platform.

Here, guests can upload messages and photos on to this photowall from their mobile devices or the Web page and they appear on the TV screen associated with the Chromecast device.. There is the ability to have “tiling up” occur for the photowall with pictures come in at different sizes.

According to the article, this software is not a polished product. But I see it appeal to other software platforms such as the “smart-TV” / connected-video-peripheral app platforms or just simply the “regular-computer” platforms (Windows and MacOS X) for display functionality. It could also work well with support for user-nominated “image pools” like NAS directories, DLNA content pools, Social-Web albums or “cloud-storage” folders.

Similarly, it could support the concept of a single “content-and-control” server which could control how pictures appear on multiple screens. This could appeal to setups where you could run multiple photowalls such as during a large party.

The Google Photowall concept could be all about realising the fact that multiple pictures can be displayed at the same time in a manner that appeals to most consumers.

Sony enters the network CD receiver market as part of their new home AV lineup

Articles – From the horse’s mouth

Sony Europe

Sony’s expanded High-Resolution Audio line-up brings you musical clarity you’ve always dreamed of (Press Release)

My Comments

Sony MAP-S1 CD receiver courtesy of Sony

Sony’s new entry to the CD-receiver scene

Sony had launched some newer hi-fi components in to the European market including the STR-DN1050 and STR-DN850 surround-sound receivers and the BDP-S7200 optical disc player which can play SACDs or Blu-Ray Discs. All of these can be part of the home network by implementing at least DLNA functionality and access to varying online-content services with the receivers even supporting Bluetooth and AirPlay functionality.

But what drew my attention to this playlist was Sony climbing on to the high-quality network-enabled CD-receiver bandwagon by offering the MAP-S1 CD receiver. These are systems that have a CD player, broadcast-radio reception, amplifier functionality and, now. access to network-hosted and online content like Internet radio but are optimised for high-quality sound. They take on the spirit of the late-1970s music centre or cassette receiver (casseiver) where a very good unit of this class could offer what a baseline component-based hi-fi system of the time offered in both sound quality and functionality.

Previously, I had given a fair bit of space to the network-enabled CD receiver, including my review of the Rotel RCX-1500 as well as a fair bit of commentary about this product type in my coverage of the Australian Audio And AV Show 2013. This is due to the “lifestyle audio” product class becoming more relevant as the small elegantly-furnished apartment becomes more relevant especially for those of us whose children have flown the family nest.

This product is different from their CMT-series micros systems due to the idea of users being optimised for high sound quality. One of the factures was that a user could supply their own speakers for this system or they could purchase a pair of Sony high-grade bookshelf speakers and use them, very much like Onkyo’s FR-435 CD/MiniDisc “music-centre” system.

The Sony MAP-S1 offers the network connectivity for DLNA, AirPlay and access to online music services like Spotify and Internet radio, and also offers the ability to work with Bluetooth smartphones using the NFC pair / connect functionality and the aptX codec. As well you can have it become a USB DAC/amplifier for a computer thus exploiting the high-resolution audio content available for download if you host that on a Windows or Mac regular computer.

One question that can be raised with this class of network-capable AV equipment is whether the equipment will support dual-band wireless networks whether using 802.11n or 802.11ac technology. Similarly, there will also be the issue of network and online functions not being available with developments that offer “headline” Wi-Fi Internet that implements Web-based login. In these situations, the Sony MAP-S1’s Bluetooth and USB Audio functions would come in to their own when it is used with a regular computer or mobile device to “pull in” online music services including Internet radio.

As more of these network-capable CD receivers come on the market and yield the high-quality sound, especially from mainstream as well as boutique AV-equipment manufacturers, a compact hi-fi system for that apartment or house could be about buying one of the CD receivers and buying or resurrecting from the garage a pair of good hi-fi speakers.

Venice’s independence referendum is the proving ground for e-voting

Article

E-voting comes of age in Italy with Venice independence referendum | PCWorld

My Comments

Venice - Creative Commons  2.0 - Courtesy of word_virus

Venice – a city that could be legitimising the online vote

As you think of wafting down those canals in Venice in a gondola, or listen to that piece of classical music by Vivaldi who was born in Venice , you don’t know that this area has just been a turning point for a change that could affect how you vote.

This neighbourhood became fed up with the way the Italian state was taxing them but not putting much back in to that area. The sentiment whipped up some interest in the secessionist movement and, due to an increase in the IT industry in that area, the idea came across to run a referendum for secession using the Web.

This required that each person registered to vote receive a unique identity number for that election where they logged in to a Web page using that number to cast their vote online with a computer, tablet or smartphone. There was also the ability to use a regular telephone to cast your vote for the referendum. There were measures in place to detect and prevent voter fraud using this system and it would also have used the SSL technology to assure a secret vote on the Web front.

Of course, the mainstream Italian media, most of whom was controlled by Silvio Berlusconi, called the vote a farce but this was able to be seen in Italy and other areas as a mature proving ground for the Internet-driven e-voting concept. Other areas like Switzerland have implemented e-voting for various referenda and Norway has eyed this technology as something to implement in their municipal elections.

Some countries may still cast doubt over the idea of electronic voting technologies, usually due to breaking perceived “comfort zones” or fear of an increased risk of electoral fraud. Even postal voting in Australia has been considered acceptable only as an “away-from-home” voting option or on a municipal level by all but a minority of councils.

What would be considered important for any online voting system would be to have a unique number for each registered voter relating to a particular election or referendum, not correlating to other “primary-key” numbers used as part of public service or commerce like tax numbers, social-security or public-health (NHS / Medicare) numbers. As well, this number is provided to each voter by regular post with one envelope for each voter even though multiple voters reside in one household such as parents and children of voting age. This would be considered a “use-once” number to assure “one person one-vote one-value” and not relate to the vote being cast.

As well, an online system would have to have highly-scrupulous security measures like use of SSL (https) Web pages with even the option of an on-screen keyboard to deter keystroke logging to assure everyone of the secret ballot. Even making sure that client-side software such as mobile-platform apps are approved would be considered important to avoid the creation of “Trojan horse” apps that work against democracy by betraying users’ votes.

A figurine-based video game emanates from Europe

Article

Hanakai Studio’s Prodigy uses NFC to marry the real with the digital | Polygon

Premier contact avec Prodigy, le jeu vidéo français à figurines qui voit grand | 01Net (France – French language / Langue Française)

From the horse’s mouth

Hanakai Studios

Video

Click to play

My Comments

France is advancing forward with a new video-game concept which utilises NFC technology.

The game which is called Prodigy is a role-playing game which integrates the traditional “Dungeons And Dragons” metaphors with the video and computer aspect using NFC-equipped figurines and cards. These are played on a special LED-equipped NFC-reader mat that is connected to a regular computer which runs the game.

But what do I see of this? I see this as a way where a studio outside the USA or Japan are innovating when it comes to computer gaming by offering a new concept and play methodology rather than modelling on what these “game hubs” have already been offering. Similarly, it is capitalising on the “Dungeons And Dragons” that is associated with most role-playing games

Like a lot of these projects, it will be funded by a crowdfunding campaign in the form of Kickstarter. I do see some great things coming from Europe with mobile casual games successes from Irelend (King.com  – Candy Crush Saga) and Finland (Rovio – Angry Birds franchise) and could see the powers that be in the European Union headquarters in Brussels promote European-produced games, especially from those countries where titles are just consumed in their domestic markets..

Macintosh users–keeping your computer secure

Article

Apple users: Try these five tips for better Mac security | Naked Security

My Comments

Just lately, I have heard over the dinner table that a few Apple Macintosh computer users have been facing issues with malware and other software with questionable behaviour. Some of these attacks were mainly “overlay attacks” that worked with the user’s Web experience.

What previously used to happen was that Windows computers were the target for viruses, worms, Trojans and similar malware due to them having a stronger installed base compared to the Apple Macintosh platform. This caused some people to switch to the Apple Macintosh platform because of less malware threats occurring on that platform.

But even in 1989 when I was made aware of the virus issue, the awareness about viruses and similar malware was targeted across all personal-computing platforms that were in operation through that year i.e. the MS-DOS-based IBM PC, the Macintosh, the Commodore Amiga and the Apple II amongst others. At that time, there was awareness about keeping a “clean” system and keeping control over how you shared your files.

Similarly, we started to see the arrival of signature-driven anti-virus programs that could scan hard disks or removable “floppy disks” for viruses. Some of these initially scanned the boot sector but moved towards checking files for these viruses. They became a very important part of every computer user’s software toolkit as the virus activity increased. But through the 1990s as the Internet came on the scene, the malware activity was more focused on the MS-DOS / Windows platform with Apple Macintosh users not having as much of that activity. At that time, the MS-DOS / Windows platform was effectively the computing platform for most personal and business computing applications including gaming with the Macintosh being used by creative types due to its inherent prowess with multimedia.

This lead to a sense of complacency concerning secure computing for the Macintosh platform on both Apple’s and their users’ part. Microsoft took proper steps in updating and patching the Windows computing platform since 2001 with the arrival of Windows XP and hardening that platform with the arrival of Windows Vista and 7. Similarly, Windows users jumped over to the Macintosh platform for their home computing because they saw Windows as being slow and virus-ridden; and also due to the arrival of Apple’s iPod and iPhone products.

Lately, the Apple Macintosh has become the target for various malware campaigns including “write-once run-anyone” attacks based on Adobe Flash and Java software platforms. This is due to the increased new-found popularity that the Macintosh has acquired and, in another context, activities involving the Internet, networks or removeable media are still being seen as vectors where the Mac can share Windows-targeted malware.

Upgrade to Mavericks if you can

To stay secure, Apple Macintosh users need to upgrade to the 10.9.2 Mavericks version of MacOS X, with this version being equipped with various security improvements in a similar way to what Microsoft did with Windows 7. This can be done with newer Macintosh computers and for free with Macs running Lion or Mountain Lion versions.

Keep the operating system and software up-to-date

As well, as part of proper computer housekeeping, it is important to keep the Mac “lock-step” with the latest operating-system updates. Here, you can use the Apple-Menu / System Preferences / App Store option to have the Mac check for and download the updates from Apple by itself; or go to the Apple-Menu / Software Update menu to cause it to check for updates. The latter option can be of use with a MacBook that is used “on-the-road” and you are able to check in at a Wi-Fi hotspot or other Wi-Fi network.

Similarly, keep Adobe Flash and Oracle Java up-to-date by using options in the Apple-Menu / System Preferences menu to check for automatic or manual updating for these programs. If any other “write-once run-anywhere” software-development platforms show up on the Macintosh platform, treat these like you would with Adobe Flash – they can become a path for distributing malware that “hits across all platforms”.

This also applies to the application software and utilities you also run on your Mac and, here, you go to whatever software-option menu there is to check for software updates or cause automatic software updating to occur.

Don’t enable Java if you don’t need it.

As for Java which appeals as a “write once run anywhere” coding system, don’t enable it unless you are intending to run a known trusted program that uses this language or are developing Java software. OS X Mavericks comes with this deactivated by default but you can deactivate this in your Web-browser option menus.

Take advantage of full-disk encryption if you have confidential data

Another practice you could use for all computer platforms is to take advantage of full-disk encryption. Most operating systems provide this as a function that you can use with MacOS X providing it “across the board” for recent iterations in the form of FileVault. Similarly, a commercial or open-source third-party full-disk-encryption tool can do the job better than what the operating system provides.

These tools encrypt and decrypt on an “on-the-fly” basis and mainly protect the local volumes on the computer with some business-tier USB memory keys providing a similar full-disk encryption for their own volumes.

Use a good anti-malware or desktop security program for the Macintosh

Check for and use a good anti-malware program for the Mac platform like Kaspersky, Sophos, AVG or ClamXav . As well, keep the anti-malware program that you run on automatic update in order to keep them ahead of the malware game.

It is also worth noting that the good programs in this field can also keep the Macintosh from being a conduit for spreading Windows-based malware around the Windows platform. This is whether the files are passed through email, message-based file transfers, network-hosted / Internet-hosted file sharing points or removeable media.

Another sign of a good anti-malware program is the ability for it to scan your computer’s primary storage (RAM and paging files) to protect against malware that works on data being held in this space. This is because most data normially encrypted on a secondary storage or in transit is kept “in the clear” in the RAM and is vulnerable to RAM-scraping malware.

Keep stock of what is installed on your Mac

Another way malware gets on to computers is when you load software “in a hurry”. Typically what can happen with some freeware tools is that they can “push” browser extensions and toolbars or utilities of doubtful provenance on to a computer. This can lead to it underperforming or malware creeping in and taking over the system.

If you download from the Mac App Store or similar download locations, check for the app’s reputation by looking at comments, star-ratings and the like. This is something I have raised previously in relation to app stores for mobile-computing platforms along with the newer App stores that are opening up for regular computers and dedicated-purpose devices.

With your browsers and other applications, keep tabs on what plugins, extensions, toolbars and other add-on modules are running and if you notice something being awry about the module since you installed, don’t hesitate to remove it. A good article on this topic concerning uninstalling applications on the Mac is this one on MacRumors.com which highlights that dragging an application bundle to the Trash may not be the only method available.

Conclusion

The main issue here is that the Apple Macintosh is a computing platform vulnerable to malware and will become more so as it be becomes more popular as a mainstream computing platform. So you would need to continue with proper computer-housekeeping practices to keep your Mac from these threats.

Some more Oxfordshire villages gain real broadband

Artilcle

Gigaclear announces next batch of Oxfordshire villages to get Gigabit | ThinkBroadband

From the horse’s mouth

Gigaclear

Rollout page – Otmoor

Press Release – Otmoor

My Comments

Gigaclear, whom I have featured on this Website, are working hard and fast on enabling more of the Oxfordshire villages for real broadband. Here, the Otmoor community which is the latest to be targeted with this technology is being set up with fibre-to-the-premises “next-generation broadband” technology.

Here, this community has its wetland and grasslands as its assets being a nature reserve, most likely being of touristic value in some way. But Gigaclear had put the broadband rollout on the map without government assistance and having this become the full symmetric broadband courtesy of the fibre-optic technology.

When I read the ThinkBroadband article, there was a comment about Gigaclear focusing their efforts on the small upmarket Oxfordshire villages rather than the “real” rural areas in the UK. But the “real” rural areas could approach Gigaclear to cover them by visiting this page and not “giving up” with them if they are turned down. There is still the issue of high-speed Internet being of importance for professionals working from home along with small businesses where online competitiveness is still valued.

Of course, a question that may be always raised with these broadband rollouts is catering to the larger properties be they estates with a large house and a handful of cottages or smaller houses or simply small or large farms that are colocated to the villages. Issues that may be raise include whether a fibre rollout may be extended to a cluster of neighbouring large properties or not.

Similarly, if Gigaclear “conquered” a larger area of Oxfordshire or a similar area, could they be seen to be in a position of influence by providing the high-speed broadband for that area?

At least the Gigaclear effort is taking place to make sure that rural communities, which are also being seen as urban outposts or venues for “tree-changes”, as viable locations for proper Internet service.

Sony PlayStation to follow the same path as Netflix

Article

Sony’s first original TV series for PlayStation will be ‘Powers’ | The Verge

My Comments

First it was Netfilx with “House Of Cards” and “Lilyhammer”. Now it’s Sony’s turn to yield an original TV series to be delivered via the Internet and the home network.

“Powers”, to be distributed in the USA via the Sony PlayStation Network to the PS4, is a bridge between a classic “police procedural” crime drama, a filme noir, and a fantasy movie. For people outside the US, TV broadcasters will be able to buy the rights to screen this show on their channels. Here, it is proving to TV producers, directors and consumers that a company who has their foot in the IPTV or video-on-demand space can commission original programming for these services rather than using them as distribution services for other people’s content.

This is similar to how cable evolved in the early 80s when the likes of HBO started producing their own content, running it on their own channels but also selling the rights for these shows to various broadcasters who wanted to run them. Similarly Canal+ have been building up a large collection of TV content that they run on their services but also are selling the rights for the content to free-to-air and pay-TV channels that run foreign-language content like SBS in Australia.

Sony are also capitalising on the fact that the PS4 games console, like its PS3 predecessor and the XBox competitors, is not just a games console but rather an “entertainment console” which is also about playing video content. For example, I have seen a young adult purposing a PS3 not just for playing games but to be used also as a Blu-Ray player. Here, Sony are running an IPTV service that will be delivered exclusively via the PS4 games console alongside the video-on-demand offerings provided through the PlayStation Network.

With Sony, Netflix, Hulu and other Internet-based TV providers, it could become an easy way in for TV producers and directors to put up content ideas or the content itself to these companies for commissioning. These stakeholders can also benefit from the ability to know whether these shows are being downloaded and what kind of viewers are downloading them so as to avoid turning out rubbishy content.

The Femtocell is to be part of the competitive French Internet-service market

Article – French language / Langue Française

Freebox Révolution : Free intègre les boîtiers Femtocell – DegroupNews.com

My Comments

Freebox Révolution - courtesy Iliad.fr

Freebox Révolution now to come with a femtocell

The French have taken another step of advantage with their competitive Internet-service market. This time it’s Free who have provided a minimal-cost femtocell to their Freebox Révolution subscribers.

What is a femtocell? This is effectively a cellular-telephony base station in a small box that can provide cellular-telephony and data coverage in a premises. These boxes typically use a broadband connection as their backhaul to the service provider and are typically used to “fill in gaps” for mobile coverage in a subscriber’s home. The devices typically sold to a residential user typically provide “selected-device” coverage, namely for the devices owned by the customer’s household.

Most of the other French operators like Bouygues Télécom  have offered femtocells but at a significant extra cost. On the other hand, Free are offering the femtocell to existing Freebox Révolution subscribers for a delivery charge of EUR€10 but will be offering it as part of the equipment bundle for newer subscriptions. This is something that I see as pushing the price very low for a service like this and, like what Free had done with Internet services and mobile telephony in France, could lead to others pushing the price down for a femtocell service or including it as part of an “n-box” triple-play deal.

These will support up to 4 phones but I do see a limitation also with any femtocell product that is integrated in a modem-router. This is where you can’t relocate the femtocell device to wherever the better coverage is really needed such as to work around a “radio shadow” affecting mobile telephony.

This may be part of a trend to make cellular phones work effectively like cordless phones and work on “fixed-line” tariff charts at home but use mobile tariff charts when “out and about”. This is more important with all of the “n-box” triple-play services where the telephony component is described as being with “appels illimité” where calls from the fixed telephone to France and a lot of other destinations come part of the deal.

It is another example of what the highly-competitive French telecommunications market is all about.

Android Wear–to make designing more and better wearables easier

Article

Google unveils Android Wear, its modified OS for wearables | Internet & Media – CNET News

From the horse’s mouth

Google – Android Wear team

Sharing What’s Up Our Sleeve: Android coming to wearables | Official Android Blog

Android Wear Developer Preview Now Available | Android Developers Blog

Promotional Video

Click to play (YouTube)

Developer Preview video

Click to play (YouTube)

My Comments

Google has just released Android Wear which is a version or “fork” of the Android mobile operating system that is pitched at the so-called “wearable” devices. But what do I see of this?

One advantage that I see of this is that manufacturers can focus on designing smartwatches and fitness bands without the need to work on the software for these devices. They could work on a brand-specific “overlay” which includes applications specific to a brand’s needs like what Samsung, Sony and HTC have done with their Android phones and tablets. But most other manufacturers like the traditional watch manufacturers can jump on the wearable bandwagon and focus on devices that look elegant and fashionable to wear. They can also work on shortcomings of the current designs such as short battery runtime (make it possible to wear a smartwatch for a night or weekend “elsewhere”).

For example, could a Swiss watch name or someone like Casio or Seiko, the doyens of the digital watches. find themselves able to clamber on to the smartwatch scene? Similarly, could we see that it is feasible to have the “ladies” and “gents” watches as well as smartwatches that are a perfect replacement for the traditional analogue or digital watch.

Another factor is software development. The Android Wear platform could appeal to software developers to write apps that work well on the wearable devices and see these targeted to many different devices. But, personally, I would like to see this focused on to “let-me-know” or “check-this” apps such as to show up messages from a messaging service, check the weather or “check in” on Foursquare. The fitness bands could work with health-and-wellness apps or similarly the “let-me-know” or “check-this” apps.

The third group of users that would benefit would be us consumers who could then find it easier to purchase a cost-effective smartwatch that we can impress others with at the office or on Friday or Saturday night. These will have as much a consistent user interface that can be worked by touch or voice thus not having to learn something new when you purchase a different Android Wear device.

As well, it also means that you don’t need to run multiple device-interface apps on your smartphone to have it work with different wearable devices like watches, Bluetooth headsets or fitness bands especially if you run multiple devices at the same time.

A question worth raising is whether these devices will have the “hub” capability promised in Bluetooth 4.1 where the watch can interact with other Bluetooth Low Energy (Bluetooth Smart) devices yet be able to upload and download data to a smartphone or tablet.  This could be of use if you decide to leave the smartphone behind while you go for that jog or swim and keep that FuelBand on you while you do that bit of exercise.

Personally, I would see this as a big break for wearables, especially smartwatches, and the Android platform. This could lead more so to innovation rather than imitation while the Android platform gains more traction as an “open-frame” mobile-device platform. In the same way, it extends the multi-screen concept between the smartphone and these watches this not having us bringing out our smartphones frequently.

Malaysia Airlines air disaster–another event bringing out the online scams

Article

Fake Malaysia Airlines links spread malware | CNET News

My Comments

Every time there is a major event that affects many people or brings out mass intrigue, a computer-security situation climbs on to that event’s tail.

What happens is that Websites with a questionable motive pop up like nobody’s business and links to these sites appear in spam emails or on the Social Web. The “link-bait” text draws people to these sites are laden with malware or set up to harvest Web-surfers’ personal or financial information for questionable purposes. The Malaysian Airlines air disaster drew out its own link-bait in the form of fake news links that purport to lead to video footage of the plane being discovered or survivors being found.

A proper practice is to keep the software on personal and other computer equipment “lock-step” with the latest software updates and patches and simply to “think before you click”. This is more so with anything that appears “too good to be true” or “out of the norm” for that situation.

Facebook users also have to be careful about the “fake events” which are being used as a spam-distribution vector. Here, as I previously covered, this causes notifications to appear in the user’s Facebook Notification list with your computer or mobile device popping up messages and sounding an audible alert to these notifications if a Facebook client is running. As well, if a user accepts these events, information appears on their Timeline about that event.