Product Review–Toshiba Satellite L750 laptop computer (Part No: PSK2YA-04P028)

Introduction

I am reviewing the Toshiba Satellite L750 Series laptop computer which Toshiba are positioning as a value-priced laptop computer for most households. This is compared to the previously-reviewed Satellite P750 multimedia model which is positioned as the premium multimedia laptop of the range.

Toshiba Satellite L750 laptop computer

Price
– this configuration
AUD$999
Processor Intel Sandy Bridge i5-2410M cheaper option: Intel Sandy Bridge i3
RAM 4Gb shared with graphics
Secondary Storage 750Gb hard disk
cheaper option
500Gb or 640Gb hard disk
DVD burner, SDHC card reader
Display Subsystem NVIDIA GeForce GT525M 1Gb dedicated display memory
Screen 15” widescreen (1366×768) LED-backlit LCD
Network Wi-Fi 802.11g/n
Ethernet Gigabit Ethernet
cheaper option
Standard Ethernet
Bluetooth 3.0 with HS
omited from cheaper models
Modem V.92-compliant data / fax modem
Connectors USB 2 x USB 2.0
1 x USB 3.0 with Sleep And Charge

cheaper option
3 x USB 2.0
Video VGA, HDMI
(HDMI omitted from cheaper models)
Audio 3.5mm input jack,
3.5mm output jack
Digital audio via HDMI
(HDMI omitted from cheaper models)
Operating System on supplied unit Microsoft Windows 7 Home Edition
Windows Experience Index – this configuration Overall: 5.5 Graphics: 5.7
Advanced Graphics: 6.5

The computer itself

Aesthetics and Build quality

Toshiba Satellite L750 laptop computer grey finish

Grey patterned finish on lid and palmrest

This Toshiba Satellite L750 is finished in a glossy grey patterned finish on the lid and palm-rest with a black escutcheon on the screen and keyboard. This pattern reminds me of a classic pattern that was used on some gray-coloured mens’ suits and pants. There is a variation which offers an all-white finish which may please the “minimalist” look or those who have moved from the earlier Apple MacBook computers.

The limitation with the glossy finish is that fingermarks can show up more easily, thus becoming a high-maintenance finish.

The L750 has the same size and thickness as the other laptops in its class thus being able to fit in drawers or old-fashioned writing desks, which would fit in well with the “New Computing Environment”.

For the price range, the computer shows very good build quality. It also hasn’t shown a tendency to run too hot which will benefit those who use high-performance applications. As well, I haven’t noticed any intense heat build-up when it was in use for extended periods.

User interface

The keyboard is a full-width keyboard with a regular numeric keypad. This works well for touch-typing yet has a “level” feel. An improvement that could be of use would be a textured feel so you know where you are rather than the slippery feel that it has.

There is a trackpad which is highlighted by a rough surface on the palmrest as well as two large glossy buttons that work as the equivalent of the mouse buttons. It still has the same likelihood of the cursor jumping around and you may have to lock it out using the button under the spacebar when you are typing.

Audio and Video

The Toshiba Satellite L750 has a pair of small speakers located above the keyboard but the sound reproduction is the typical quality for most mainstream laptops. If you want to get the best sound out of this one, you would have to connect it to good headphones or speakers or a nice sound system.

Due to the use of the NVIDIA discrete graphics subsystem and dedicated graphics memory, this computer would work well for proper graphics performance on most games and multimedia applications.

One feature that may annoy some users is the use of a glossy screen. This would cause distracting reflections in well-lit environments like outdoors or most household family rooms. I have seen other laptops that don’t use this glossy screen but they are typically the business computers like the Tecra R850 that I previously reviewed.

Expansion and Connectivity

Toshiba Satellite L750 laptop computer - left had side connections (Gigabit Ethernet, VGA, USB 3.0, HDMI, audio input and output)

Left-hand-side connectors - Gigabit Ethernet, VGA, USB 3.0, HDMI, audio input and output

I am reviewing the top-end model of this series which is equipped with the 750Gb hard disk, a USB 3.0 port, Bluetooth, Gigabit Ethernet and HDMI. Cheaper models in this series omit these connectivity options and offer 3 USB 2.0 ports, regular Ethernet as well as smaller hard disks.

In this day and age, the Gigabit Ethernet, HDMI, Bluetooth and USB 3.0 or eSATA options are considered important connectivity options for laptops. This is to allow for connectivity with wireless peripherals, extra secondary storage and wired networks such as next-generation broadband.

Toshiba Satellite L750 laptop computer right-hand-side connectors and DVD burner (2 x USB ports, RJ11 telephone line port, power connector)

Right-hand-side connections and DVD burner - 2 x USB 2.0 ports, RJ11 telephone line port, power connector

All computers in this series are equipped with an integrated V92 dial-up data / fax modem but this would be useful for sending faxes directly from the computer or people who don’t have access to real broadband.

Battery life

The Toshiba Satellite L750 doesn’t implement the dual-graphics functionality that allows for battery economy during basic text-editing or Web-browsing tasks. This has caused it to run out of power too quickly on text-based or mixed-task work including Web browsing.

But I had let this laptop run through a DVD movie on batteries and it was able to work for 175 minutes continuously before it gave out.

Limitations And Points Of Improvenemt

Toshiba Satellite L750 laptop computerOne point of improvement that I would like to see for the series would be current connectivity options across the whole lineup rather than just the top-end models. Here, the machines could be differed by processor type, RAM and hard-disk capacity and any aesthetic variations like system colour.

Conclusion

The Toshiba Satellite L750 laptop computer, especially this configuration that I reviewed, is one of many laptop computers that I would recommend for use as a “family computer” for most households where it will get a lot of use. It is more so if the household is intending to head towards the laptop-based “new computing environment”.

As well, the computer would also work well for small-business laptop users who just want to get started with a “work-home” laptop computer and have to choose this kind of computer from larger retail stores. The integrated dial-up modem would be a bonuse for most rural dwellers who are stuck with this technology until governments and companies “get off their backsides” and provide real broadband to the country.Toshiba Satellite L750 laptop computer lid view

You may get away with specifying the cheaper models of the series if you are willing to forego the current connectivity expectations like USB 3.0, Bluetooth and HDMI as well as opting for a smaller hard disk.

How is an Ultrabook different from the typical ultraportable notebook computer?

There is a new class of ultraportable notebook computer that is being defined through this year and next year by Intel in response to the success of the Apple MacBook Air. You may think that it is no different from ultraportables like the Toshiba Portege R830 that I reviewed on this site.

But these computers, known as “Ultrabooks”, will be intended to put the idea of a “portable-typewriter” size of laptop in the laps of most public-transport and air travellers rather than business executives.

What is the Ultrabook

Like the typical ultraportable of the same ilk as the Toshiba R830, these computers have the 13” screen and the same footprint that makes them useable on that bus or economy-class airline tray table. Yet they will be usable for creating content like typing up those documents and blog posts on the move.

But what makes them an Ultrabook is that they will have an ultra-slim chassis which has to be less than 1.8cm thick when closed and weigh in at 1.4kg or less. The battery runtime has to be longer than five hours which would cater for useable time on a long-distance air trip or a day of hotspot surfing.

The required maximum price for these units is around US$1000 which would put them in to the hands of most users. This price would be applicable to the base model in an “Ultrabook” lineup, with increases in price for extras like increased RAM, faster processors or increased secondary storage.

Functionality requirements

The goal of the functionality requirements it for an Ultrabook not to be an underpowered ultraportable computer just for document creation and basic Internet activity, but to be on a par with a typical 15” laptop that can excel at multimedia or basic gaming.

The main drivers in the design are the use of Intel Core i3,i5 or i7 processors providing the horsepower with the images on the screen painted by Intel HD integrated graphics. These units will have to use solid-state storage technology rather than the orthodox mechanical hard disk for their main secondary-storage system. They will also forego the optical drive as an integrated removable-storage option, so you will have to use a USB DVD drive if you want to view rented DVDs or turn out DVD copies of your photos. Of course there will be an SD card slot so you can download your digital-camera pictures to your Ultrabook for reviewing and editing.

Most such computers wont have the Ethernet or VGA connectivity. Here this will mean that you will need to use Wi-Fi to connect to your home or small-business network 

As well, you will have to connect the Ultrabook to the economy-priced data projector using a DisplayLink USB-VGA adaptor. Of course these units would use either a DisplayPort or HDMI external display connector, usually of the mini form factor.

These connectivity issues will typically be mitigated through the availability of multifunction docking stations that connect to the Ultrabook via a DisplayPort or USB connection. 

The typical Ultrabook will be housed in a sealed case that precludes easy upgrades. But this will typically support the “push-down and replace” practice when users want better functionality or performance. Here, the computer would be disposed of to a user with lesser needs while the user purchases a machine with the specifications that suit their current needs.

Purchasing notes

If you maintain a desktop or larger laptop computer as your main computer, it may be OK to skimp on the secondary-storage capacity if you only intend to use it as a “travel computer”. Then you use the home or small-business network, cloud-services like SkyDrive or USB-attached external storage to keep the data you are working with in step with your main machine.

Other comments

I would like to see AMD and others define a similar name and standard for ultraportables that make this goal so that the computers don’t have to be all Intel-driven. This could then lower the price bar for computers of this class.

Similarly what Windows 8 will offer with touchscreen operation may open up paths towards convertible “Ultrabooks” that are a feasible alternative to a tablet computer.

As well, I would like to see manufacturers avoid making this class of computer become a class of “MacBook Air copycats”. This could be achieved through the use of different colours and finishes or even different materials and textures.

Conclusion

What I like more about the Ultrabook concept is that it puts the idea of a lightweight travel-friendly notebook computer that works well for content creation as a credible alternative to netbooks or tablets.

What connectivity options to look for in those iPod speaker-docks?

The market is flooded with so many iPod / iPhone speaker-dock systems that you don’t know which ones to consider or what to get. A few of these units that are built by hi-fi names can yield a very good room-filling sound with the deep bass whereas other cheap units just don’t cut it with sound quality.

But you need to be sure that you can use them with devices beyond the Apple iPod or iPhone. Some cheaper speaker-docks have just the slot for an iPod or iPhone and they become useless for those of you who use tablet computers, laptops or Android / WP7 phones.

A line-level input

The speaker dock must be equipped with a line-level audio input of some form. Here, it will be a 3.5mm phone jack or a pair of RCA sockets located on the front or back of the device and this connector may be labelled AUX IN, AUDIO IN, LINE IN or something similar. A few devices use a flylead with an 3.5mm stereo phone plug at one end for quickly plugging your phone or other source in to the speaker dock.

A variety of these speaker docks have a volume control of their own so you can connect an audio-playback device with a fixed output level like a CD player to them yet be able to adjust the volume. On the other hand, this connection would require you to adjust the volume at the source device.

Other connections nice to have

I have raised these other options that may exist in addition to broadcast-radio reception or access to the home network for Internet radio and DLNA-compliant content playback, that may exist in some speaker docks.

USB connectivity

A standard USB socket can be nice to have for charging and powering devices like tablet computers or mobile phones on the end of a USB cable. Some setups may also allow playback of content held on a phone or USB memory key through the use of the speaker-dock’s control surface.

Bluetooth A2DP connectivity

This connectivity option works with a large range of mobile devices ranging from some MP3 players through phones and tablets based on the common operating platforms to laptops running Windows, MacOS X and Linux. Here, you have a wireless link from the device to the speaker dock using this standard. This would work well with tablet computers that work as your personal jukebox.

Some speakers like the Bose SoundDock series may offer this as a manufacturer-supplied optional accessory. On the other hand, you can use a third-party Bluetooth audio link that connects to the speaker’s line-level input.

Conclusion

If you looking for that iPod speaker-dock, make sure that, even if you are primarily using it with your iPod or iPhone, it is future proof for use with tablet computers and other devices so you can get more out of the speaker dock.

A fight for broadband is an instrument of democracy

Article

What a fight for broadband tells us about democracy | GigaOM

My Comments

A situation that is repeating itself in many US towns and communities that don’t have proper broadband is the desire for these towns to benefit from the broadband service. They will typically use tactics like a wired or wireless broadband Internet service funded by the local government, perhaps in partnership with a telecommunications firm. It can even encompass the provision of full infrastructure by local interests for annexation by a local telecommunications carrier in order to hasten the provision of real Internet service.

But established telecommunications and cable-TV firms like Comcast who have wireline monopoly over these areas fear the arrival of these competitive elements. They have established requirements on towns who want to set up such services to run referenda about such services and run highly-funded campaigns against these services when they come to the vote.

This situation creates a breeding ground for redlining and an anticompetitive trade environment for Internet and other advanced telecommunications services. The redlining can occur based on perceived “lack of profitability” for communities even though the community will benefit economically through access to advanced telecommunications.

At the moment, the Federal Communications Commission are in the throes of reforming the Universal Service Fund which financially offsets universal-service obligations for basic telephony service through the USA. Here, they want to encompass broadband Internet and cable-TV services in this mix and local communities should also lobby the FCC on this issue.

The FCC could also work better by allowing European-style competition regimes like local-loop unbundling for ADSL or mandated access to pits, ducts and poles for cable and fibre-optic service. This ends up favouring the customers through what I have observed in France and the UK.

As well, the Federal Trade Commission could be allowed to be involved in issues concerning anticompetitive behaviour in telecommunications-service provisioning. This can allow for antitrust aspects to be investigated as well as other standards concerning telecommunications service.

But I would see this more likely occurring under a Democrat administration rather than a Republican administration which favours the big corporations and anticompetitive trading. As well, where there is lively competition, there is a greater chance for people to take up the technology and a greater chance for innovation.

Freebox Révolution–the standard to measure a triple-play service by

Articles (French language – best resources)

Dossier -Test du Freebox Server | DegroupNews

Freebox Revolution – Test du Freebox Player | DegroupNews

From the horse’s mouth

Freebox Home Page – Free (France – French language)

My comments

Typically, the kind of equipment supplied to consumers by telecommunications carriers and Internet service providers for “triple-play”or similar Internet services has typically been drab in design and functionality. This is typically to work to the lowest-common denominator with both price, functionality and style.

The situation is very different in France where there is a lively competitive market for “triple-play”Internet service. Most urban or regional centres in this country are “dégroupée” for multiple competing ADSL-service operators. Here, these operators have access to the customers’ telephone lines as cable without paying France Télécom for a dial-tone service. There is also a steady rollout of fibre-optic service by the competing service providers for next-generation broadband Internet, with an overlaying requirement to provide competitive access to the ducts and poles for the fibre-optic service.

One of these major players is Free who have established a triple-play service for many years. Their latest iteration of the “Freebox” is now a benchmark for anyone offering a similar setup, whether in France or anywhere else.

I have previously covered the Freebox Révolution  in HomeNetworking01.info when a recent firmware update was released that integrated it with Apple’s ecosystem. As well, I have researched many French and English-language resources to learn more about this system.

The Freebox Révolution system

This system, like other triple-play setups offered in France, comprises of an Internet-gateway device, known as a “box”, and a set-top-box, known as a “décodeur”. These units have typically been interlinked by an Ethernet cable or user-supplied HomePlug kit, but is connected through a pair of “Freeplugs” which combine a power supply and a HomePlug-AV-Ethernet bridge in one box.

The units are a statement of industrial design in a similar way that Bang & Olufsen equipment are still a statement in this regard for consumer audio-video equipment. Both the Internet-gateway device and the set-top box have been designed by Phillippe Starck, known for extraordinary designs like the Parrot Zikmu network-enabled speakers or some of the LaCie external hard drives or network-attached storage systems.

Internet Gateway Device (Freebox Server)

This device consists of a broadband router, network-attached storage, VoIP ATA with DECT base station and audio player in one box.

It has a dual-WAN interface for either an ADSL2 service or an FTTH fibre-optic service. But the LAN functionality is one of the hallmarks of a cutting-edge device. It has 4 Gigabit Ethernet switched ports for Ethernet client devices as well as an access point for an 802,11n three-stream 450Mbps Wi-Fi segment. I mentioned previously that this unit also supports a HomePlug AV segment through the use of the supplied Freeplug adaptors. The Wi-Fi access point can also work as a separate “hotspot segment” for other Free subscribers.

The VoIP functionality works with an integrated analog-telephony adaptor and a DECT base station that you can associate 8 DECT cordless handsets with. These will provide full functionality with CAT-iQ DECT handsets.

The 250Gb NAS can work with the regular file-protocol suspects (CIFS, FTP, HTTP) but can work as a DLNA media server. It also works as a “staging post” for FTP, HTTP and BitTorrent downloads, the latter function being described as a “seedbox”. The recent firmware upgrades also implemented Apple TimeMachine support for incremental MacOS data backups. Of course, there is USB connectivity for 2 devices as well as eSATA connectivity for an external hard disk.

There are integrated speakers for playing media held on the hard disk, the Internet or an Apple AirPlay network but you can use it as an elementary amplified-speakers setup by connecting a Discman or iPod to its AUDIO IN jack. Of course you can play the music through better powered speakers or an amplifier using the AUDIO OUT jack.

This router is totally UPnP to the hilt with UPnP Internet-Gateway-Device for hands-free setup with Skype, games, MSN Messenger and the like; as well as being a UPnP AV / DLNA media server. Free could do better by integrating something like TwonkyMedia which can allow content discovery on metadata other than the file-system tree.

Let’s not forget that the Freebox Server is IPv6-ready as expected for a future-proof device. This is being augmented by the fact that ADSL Free subscribers in zone dégroupée aras or FTTH Free subscribers can have an IPv6 connection now.

Set-Top Box (Freebox Player)

This unit has an integrated Blu-Ray player with Blu-Ray 3D support (after new firmware added) as well as a digital-TV / IPTV set-top box / PVR. It connects to the TV via an HDMI connector or a SCART cable, both offering that “single-pipe” connectivity between the Freebox and the TV. Of course, there are connectivity options for other audio-video setups like SPDIF optical; and you can connect USB peripherals like SD card readers to this unit for direct viewing.

It is controlled via a gyroscopic remote control but has a supplied game controller as an alternate input device. Of course, you can connect a USB keyboard and mouse to it as extra input devices or control it from your iPad using the Freebox Connect app.

One drawcard in my opinion is that it is a fully-fledged Internet terminal with access to an app store, namely the FreeStore app store. This allows you to download games and similar “lean-back” apps; as well as view the Web or check email from your couch. Just of late, this set-top box has had YouTube support baked in to its latest firmware update.

You can now use the Freebox Player and its associated sound system or television’s speaker to play material from your iTunes software or iOS device using AirPlay. This at the moment applies to audio content only.As well, you can discover and play content held on DLNA-compliant media servers on your network including the Freebox Server’s hard disk.

Plans and Pricing

You can equip that French home or apartment with this device for € 29.90 per month. This gives you inclusive unlimited telephone telephone calls to standard phone services in most countries (Europe, Francophone countries, US, Australia, NZ, etc); and mobiles in France.

The Internet service would be up to 28Mbps while you have access to most basic TV service. Pay €1.99/month extra for 185 additional TV channels while you can service another room with Free’s TV service for €4.99/month extra with a simple set-top box or another of this Freebox Player for €9.99/month extra.

Existing Free subscribers can upgrade for €199.99 less €30 for each year they have been with Free.

The prices are obtained from Free’s latest tariff charts available on their site and would appear to be ridiculously low for people who live in a country that doesn’t have a lively competitive broadband-Internet market.

Conclusion

What I see of the Freebox Révolution is a system of equipment for a home network that is all about an Internet service provider offering a future-proof attractive cutting-edge piece of equipment rather than offering second-rate equipment to their customers.

This is primarily driven by a country who is behind a really competitive Internet service market for consumers and that the competition is driven on value rather than the cheapest price possible.

What’s right and wrong about the new Facebook ticker?

Any of you who have used Facebook’s regular desktop interface lately will have noticed key changes to this user interface.This interface revamp has been the subject of a lot of negative and positive press about this user interface change in the blogosphere and the consumer IT press. Of course, you won’t notice this if you are using Facebook from a client program like a mobile app.

When you notice the interface changes, you will see a column on the right which highlights who of your friends are online at the moment as well as a constantly-updated ticker of friends’ activity. The list of who is online is segmented by whom you have interacted with lately as well as those of your Friends who are currently online. Both these windows are separately scrollable but you have to look for a black vertical bar on the right.

This has been augmented by an “improved” news feed with groups for “top stories” and delineated “Recent Events” and “From Earlier Today” clusters. This delineates what you saw in your last view of Facebook and your current view on the same computer.

At the moment, the ticker only shows your Friends’ activity, with the ability to link to the posts, Pages, other Friends or other items referenced in the activity. This is different from the News Feed which covers all Page and Group activity as well as your Friends’ activity. Some Pages may appear in your Ticker but this may not be consistent across all Pages.

You will have the item “detailed on” with a larger view if you hover over it with your mouse. This will give you the contextual options of what you can do with this item such as to add the person to your Friend list or comment on the post.

This ticker well be dimmed if you are “paging through” a Photo Album or viewing a Photo in detail. It will only be visible if you are using Facebook and won’t appear if you head off to a link outside Facebook.

I would improve on this by allowing the user to determine the view of the ticker, such as through classes of events and use of filtering or formatting of events important to the user. As well, the Ticker, along with the presence window could be made available as a desktop utility in a similar vein to ICQ or MSN Messenger so you can keep tabs on this whenever you visit different sites.

Of course, it would take some time to get used to any new interface change for an online service and social networking is no exception.

iOS 5 finally released and available for updating your iPhone or iPad with

Article

Apple iOS 5 review: Modest, but definitely worthwhile | iPhone Atlas – CNET Reviews

From the horse’s mouth

Apple – iOS 5

Previous coverage in HomeNetworking01.info

Apple iOS 5 to be updated without the need to tether your device

My Comments

Now the iOS 5 has been released, it will offer some major benefits for your iPhone or iPad. You will have to tether your iPhone, iPod Touch or iPad to your computer to update it to the new version but this will be the last time you need to tether the device according to Apple.

Here, you will have the operating-system updates able to be downloaded over the air using the same method as what is used for delivering and updating the apps for your device. Newly-deployed iOS devices will not need a computer to be present as part of their setup process anymore.

As well, if your iDevice is charging and the computer that hosts your device’s parent iTunes collection is on, the device will be synced over the home network. This is something that has been offered by competing mobile platforms with their desktop software.

There are some benefits like improved operation for some of the integrated apps. This also includes a “notifications” screen similar to what Android users have had; as well as an integrated Twitter client. Of course it supports an iP messaging service that works between Apple iOS devices and I am not sure if there are clients for the desktop operating systems.

As well, I detailed on a speech-driven agent app called Siri which interacts with the iOS 5 devices by responding to your spoken requests. This function has been promoted in relation to the iPhone 4S smartphone.

There are a few functions that the competing mobile platforms still have an advantage over the Apple iOS platform. One is the provision of always-displayed screen items that programmatically change or act as a user interface to a program. These are in the form of “widgets” and “live wallpaper” in the Android platform and “tiles” in the Windows Phone 7 platform; and could show running data like time, weather or stock-market data. The Apple platform only allows apps to attach a “bubble” to their screen icon that can show a number or a “traffic-light” colour to show certain events; and this has severe limitations. For example, you can’t control or monitor multiple devices or functions using a single monitor app. This could be something that could be rolled out in a subsequent major update for the iOS platform.

At least this operating system will be a major break for your iOS device by offering it a lot more.

Interview and Presentation–Security Issues associated with cloud-based computing

Introduction

Alastair MacGibbon - Centre For Internet Safety (University of Canberra)

Alastair MacGibbon – Centre For Internet Safety (University of Camberra)

I have been invited to do an interview with Alastair MacGibbon of Centre For Internet Safety (University Of Canberra) and Brahman Thiyagalingham of SAI Global who is involved in auditing computing service providers for data security compliance.

This interview and the presentation delivered by Alastair which I attended subsequently is about the issue of data security in the cloud-driven “computing-as-a-service” world of information technology.

Cloud based computing

We often hear the term “cloud computing” being used to describe newer outsourced computing setups, especially those which use multiple data centers and servers. But, for the context of this interview, we use this term to cover all “computing-as-a-service” models that are in place.

Brahman Thyagalingham - SAI Global

Brahman Thyagalingham – SAI Global

These “cloud-based computing” setups are in use by every consumer and business owner or manager as they go through their online and offline lives. Examples of these include client-based and Web-based email services, the Social Web (Facebook, Twitter, etc), photo-sharing services and online-gaming services. But it also encompasses systems that are part of our everyday lives like payment for goods and services; the use of public transport including air travel; as well as private and public medical services.

This is an increasing trend as an increasing number of companies offer information solutions for our work or play life that are dependent on some form of “computing-as-a-service” backend. It also encompasses building control, security and energy management; as well as telehealth with these services offered through the use of outsourced backend servers.

Factors concerning cloud-based computing and data security

Risks to data

There are many risks that can affect data in cloud-based computing and other “computing-as-a-service” setups.

Data theft

The most obvious and highly-publicised risk is threats to data security. This can come in the form of the computing infrastructure being hacked including malware attacks on client or other computers in the infrastructure to social-engineering attacks on the service’s participants.

A clear example of this were the recent attacks on Sony’s online gaming systems like the PlayStation Network. Here, there was a successful break-in in April which caused Sony to shut down the PlayStation Network and Qriocity for a month. Then, a break-in attempt on many of the PlayStation Network accounts had taken place this week ending 13 October 2011.

The attack on data isn’t just by lonely script kiddies anymore. It is being performed by organised crime; competitors engaging in industrial espionage and nation states engaging in economic or political espionage. The data that is being stolen is identities of end-users; personal and business financial data; and business intellectual property like customer information, the “secret sauce” and details about the brand and image.

Other risks

Other situations can occur that compromise the integrity of the data, For example, a computing service provider could become insolvent or change ownership. This can affect the continuity of the computing service and the availability of the data on the systems. It also can affect who owns the actual data held in these systems.

Another situation can occur if there is a system or network breakdown or drop in performance. This may be caused by a security breach; but can be caused by ageing hardware and software or, as I have seen more recently, an oversubscribed service where there is more demand than the service can handle. I have mentioned this latest scenario in HomeNetworking01.info in relation to Web-based email providers like Gmail becoming oversubscribed and performing too slowly for their users.

Common rhetoric delivered to end-users of computing services

The industry focuses the responsibility of data security for these services on to the end-users of the services.

Typically the mantra is to keep software on end computers (including firmware on dedicated devices) up-to-date; develop good password habits by using strong passwords that are regularly changed and not visible to others; and make backup copies of the data.

New trends brought on by the Social Web

But there are factors that are being undone by the use of the Social Web. One is the use of password-reset questions and procedures that are based on factors known to the end user. Here, the factors can be disclosed by crawling data left available on social-networking sites, blogs and similar services.

Similarly, consumer sites like forums, and comment trees are implementing single-sign-on setups that use credential pools hosted by other services popular to consumers; namely Google, Facebook and Windows Live. This also extends to “account-tying” by popular services so that you are logged on to one service if you are logged on to another. These can create a weaker security environment and aren’t valued by companies like banks which hold high-stakes data.

The new direction

As well, it has been previously very easy for a service provider to absolve themselves of the responsibility they have to their users and the data they create. This has been through the use of complex legalese in their service agreements that users have to assent to before they sign up to the service.

Now the weight for data security is now being placed primarily on the service providers who offer these services to the end users rather than the end users themselves. Even if the service provider is providing technology to facilitate another organisation’s operations, they will have to be responsible for that organisation’s data and the data stream created by the organisation’s customers.

Handling a data break-in or similar incident

Common procedures taken by service providers

A typical procedure in handling a compromised user account is that the account is locked down by the service provider. The user is then forced to set a new password for that account. In the case of banking and other cards that are compromised, the compromised account cards would be voided sot that retailers or ATMs seize them and the customer would be issued with a new card and have to determine a new PIN.

The question that was raised in the interview and presentation today is what was placed at risk during the recent Sony break-ins. The typical report was that the customers’ login credentials were compromised, with some doubtful talk about the customers’ credit-card and stored-value-wallet data being at risk.

Inconsistent data-protection laws

One issue that was raised today was inconsistent data-protection laws that were in place across the globe. An example of this is Australia – the “She’ll Be Right” nation. Compared to the USA and the UK, Australians don’t benefit from data-protection laws that require data-compromise disclosure.

What is needed in a robust data-compromise-disclosure law or regulation is for data-security incidents to the disclosed properly and promptly to the law-enforcement authorities and the end-users.

This should cover what data was affected, which end-users were placed at risk by the security breach, when the incident took place and where it took place

International issues

We also raised the issue of what happens if the situation crosses national borders. Here nations would have to set out practices in handling these incidents.

It may be an issue that has to evolved in the similar way that other factors of international law like extradition, international child-custody/access, and money-laundering have evolved.

Use of industry standards

Customers place trust in brands associated with products and services. The example that we were talking about with the Sony data breach was the Sony name has been well-respected for audio-visual electronics since the 1960s. As well, the PlayStation name was a brand of respect associated with a highly-innovative electronic gaming experience. But these names were compromised in the recent security incidents.

There is a demand for standards that prove the ability for a computing service provider to provide a stable proper secure computing service. Analogies that we raised were those standards that were in place to assure the provision of safe goods like those concerning vehicle parts like windscreens or those affecting the fire-safety rating of the upholstered furniture and soft-furnishings in the hotel that we were in during the afternoon.

Examples of these are the nationally-recognised standards bodies like Standards Australia, British Standards Institute and Underwriters Laboratories. As well there have been internationally-recognised standards bodies like the International Standards Organisation; and industry-driven standards groups like DLNA.

The standards we were focusing on today were the ISO 27001 which covers information security and the ISO 20000 which covers IT service management.

Regulation of standards

Here, the government regulators need to “have teeth” when it comes to assuring proper compliance. This includes the ability to issue severe fines against companies who aren’t handling the data breaches responsibly as well as mitigation of these fines for companies who had an incident but had audited compliance to the standards. This would be demonstrated with evidence of compliant workflow through their procedures, especially through the data incident.

As well, Brahmin had underscored the need for regular auditing of “computing as a service” providers so they can prove to customers and end users that they have procedures in place to deal with data incidents.

I would augment this with the use of a customer-recognisable distinct “Trusted Computing Service Provider” logo that can only be used if the company is compliant the the standards in their processes. The logo would be promoted with a customer-facing advertising campaign that promotes the virtues of buying serviced computing from a compliant provider. This would be the “computing-as-a-service” equivalent of the classic “Good Housekeeping Seal” that was used for food and kitchen equipment in the USA,

Conclusion

What I have taken from this event is that the effort for maintaining a secure computing service is now moving away from the customer who uses the service towards the provider who provides the service. As well, there is a requirement to establish and enforce industry-recognised standards concerning the provision of these services.

Product Review–Brother VM-100 visitor management software

Introduction

I have seen the Brother VM-100 visitor-management software in action for myself when I visited Brother’s headquarters in Sydney for the interview that I did with Stephen Bennett and Heidi Webster last year. Now I have the chance to put this same software through its paces as an entry-level visitor management setup for that small office.

Price:

Software package: AUD$399

System kit with QL-570 printer: AUD$499

In some areas, the system kit with the label printer would be known as the VM-100VP whereas in other areas it would be known as the QL-570VP. This will be of importance when you want to track down the visitor management system as a full kit.

These also include a roll of thermal paper for the label printer as well as a starter-pack of 12 badge holders and clips.

The software works on the Windows desktop computing platform with an operating system from Windows XP onwards. This would cover most computers deployed in the small-business world over the last ten years.

Functions

Brother VM-100 visitor management system login screen

Login screen

The software is able to work as a receptionist-aided mode for the typical reception desk or as a self-check-in mode for conferences and trade events.The data in this software is password-protected and when administrators log in, they either can log in as a user with no administrator privileges available or as an administrator that only can work the higher-level functions.

It is also feasible to set inactive visitor data to be automatically purged after a certain time period ranging from a week to a year; which keeps with different individual-privacy and data-protection requirements.

The standard receptionist-aided mode allows the creation of a visitor badge and a parking permit, with the latter supporting a loosely-described vehicle for the parking permit. It also supports the creation of a “reserve list” which is populated with visitors who have been pre-registered and are intending to be checked in. This works well if you have the staff inform the receptionist of expected visitors, are handling large visitor groups or you want to use this software for managing an “invitation-only” event with the list full of RSVP’d invitees. Parents, take note here when it comes to managing that 16th birthday and you want to make sure that the party isn’t overrun by gatecrashers.

Brother VM-100 visitor management software receptionist screen

Receptionist's data-entry screen

The Brother VM-100 software has the ability to turn out an “emergency list” of visitors who are currently checked using the regular printer for whenever you need to reconcile whoever is in the building during emergency situations. As well, the data can be exported as CSV (comma-separated) text files for use with other programs. This same data form is also used to import potential hosts in to the “hosts” table. This supports hosts coming from different departments or organisations, thus able to work with larger multi-department organisations or buildings that have many tenants but one common reception desk.

Experience with the software

When you install the software, you have to restart the computer after the installation process is completed. Otherwise the program won’t work properly. As well, there are error messages that are simply “generic error” stub messages appearing if things go wrong through the installation.

Brother VM-100 visitor-management software self-checkin screen

Self-checkin screen for conference registration

The username and password setup allows suitably-privileged users to operate either as regular users or administratiors. The only limitation is that the password string only handles basic alphanumeric characters – it doesn’t allow the use of punctuation in the passwords, which could allow for stronger passwords.

The administrator user can choose various badge layouts for use as the standard layout for both the badge and the parking permit, but there isn’t the ability to custom-design a layout for one’s own needs.

The process of checking in and checking out visitors works incredibly smoothly and the user interface does a good job in making this easier for untrained operators. There is the support to take images of visitors as they are checked in using your computer’s webcam.

Default visitor label generated by Brother VM-100 visitor management software

Default visitor label

If you use the self-checkin setup, the check-in process is totally wizard-driven where your visitors work through two screens to sign in and obtain their conference pass or badge.

There is the ability to load visitor details for reserving or signing in and out from the “Reserved”, “Signed In” and “Signed Out” lists. As well, visitor data can be imported in to the system from such services as contact management systems.

Limitations and points of improvement

The parking permit function could support the ability to keep vehicle data in a separate table indexed by the vehicle’s number-plate (license plate) and containing make, model and colour data. This could improve the workflow process for creating parking permits for regular visitors’ vehicles.

There is the ability to sign in accompanying visitors, but the label printer will turn out a badge as you sign in the visitor. This can be OK for two or three people checking in at once but would be a problem if you had to do something like check in a busload of school students who are visiting as part of a field trip. In this case, the receptionist would have to “reserve” all of the group members, then select the group members from this list using either Shift+click (for contiguous entries) or Ctrl+click (for non-contiguous entries), then click “Sign in and print badge” to check the group in and turn out the badges.

This function could be improved by supporting a “group mode” which allows the receptionist to enter details for the group members, then click a “Sign group in” button when the last member is entered. Here, all the group is entered and the badge printer spits out the badges. As well, this could support the turning out of any parking permits in that same run so these are handed out to the drivers.

As well, I would like to see the program support the ability to work with ODBC-compliant databases or other database-hooks that are standards compliant. It could make such data collections as the host list work with data sources like human-resources databases.

Other points of improvement could also include the ability to allow the receptionist to choose the printer that they send the emergency report to rather than the default printer that is assigned for the system; and the ability to determine other visit reasons in the “Purpose of Visit” field.

These limitations and the lack of “polish” in the user interface may be typical for a version-1 (first release) program but I would like to see the program being improved continuously through its lifecycle rather than appear as a half-baked effort to work with Brother’s label printers.

Conclusion

As it stands, the Brother VM-100 visitor management system works as a capable entry-level visitor management setup for the typical small office, factory or warehouse. It may be stumped as far as integration with other back-end systems for growing organisations is concerned but, being a program in its early stages, it is something that would be expected.

Product Review–Brother QL-570 Label Printer

Introduction

I am reviewing the Brother QL-570 thermal label printer which works with a host computer as a simple label-printing system but can suit other tape-printing application.

Brother QL-570 thermal label printer

Price

RRP: AUD$129.00

This label printer is also available as part of a visitor-management package which costs AUD$499 that has the software, a brace of thermal-paper rolls for the printer as well as 12 plastic badges and accompanying clips.The software, which I will be reviewing next, is also available as an add-on package for AUD$399.

The unit itself

The Brother QL-570 is a very compact label that is as wide as the typical receipt printer or two desktop sticky-tape dispensers. So it wouldn’t take up much room on one’s desk and could even perch on the top ledge of a reception desk without getting in the way of the view of the receptionist.

Connections

The label printer connects directly to the host computer using a standard USB cable. It doesn’t support any RS232C connectivity which would hamper its useability as a receipt printer for most POS systems and hotspot-management systems that use this connection. Brother offers a network-connectable variant of this unit as the QL-580N which connects to an existing Ethernet network segment.

There is one thing that I am pleased about this unit in the way it is powered. It is a self-powered device rather than being powered from the host computer’s USB cable. But the way it is connected to AC power is refreshingly different for this class of device. Here, the power supply is built in to the unit and it is connected to the power outlet using a standard AC cord of the kind you use to connect a boom-box to the mains. Here, you benefit from an easily-replaceable power cord and you don’t have to worry about losing powerboard space to awkwardly-sized “wall-wart” power supplies.

Printing

Brother QL-570 thermal label printer tape compartment with tape

Tape compartment with tape roll in place

The Brother QL-570 prints on to the labels or tape using direct-thermal printing, like the typical receipt printer or the older fax machine. Here, these units used a special thermal paper that has its top surface burnt off whenever the paper needs to be marked and this printing technique is known for printouts that fade over time.

This is although Brother uses a special layer to protect the labels from fading. As well, this unit uses a built-in guillotine to cut the paper labels or tape. It can work with Brother-supplied adhesive or non-adhesive label-tape reels that are up to 90mm wide.

You install a tape reel by dropping it in to the tape well, making sure that a square black clip is outside the tape rest on the right. Then you have to thread the tape through a slot so it comes out the label printer’s front. You have to make sure the cover is closed before you use the printer. This includes using the form-feed or paper-cut buttons to feed the tape through properly.

Brother furnishes the same P-Touch Editor label-creation software as they have provided for their PT-2730 label writer to create custom labels. This also supports the creation of merged labels and work with supplied plug-in modules for Microsoft Word, Excel and Outlook. There is also a P-Touch address book to “get you going” with printed labels for your envelopes.

Programmers and software developers have access to a software-development kit available for download from Brother’s Website. This works tightly with Microsoft’s Visual Basic, Visual C and Access development environments.

Points of improvement

Brother QL-570 thermal label printer tape path shown

Tape path shiown - marked side isn't used for printing

As far as connectivity goes, a label printer like the Brother QL-570 could be designed for USB bus-powered operation, thus avoiding the need for extra cables to run to the printer as well as working properly with laptop computers. On the other hand, this label printer could benefit from an integrated self-powered USB hub thus creating more USB ports to connect devices to the host computer.

I would also like to see this printer support any and all USB device classes that relate to label or receipt printing for point-of-sale or gaming applications. This could also allow the printer to work with devices like point-of-sale terminals, TV set-top boxes, gaming / amusement systems and the like as a label or receipt / voucher printer.

It could also be able to work with the typical thermal-paper rolls used for receipt printing, which would be commonly available around most businesses. This would benefit the QL-570 being used in visitor-management or similar applications where you use “one-shot” badges or tickets.

As I have said before, the Brother P-Touch label-creation software could benefit from a measuring-tape creation program so one can create measuring tapes.

Conclusion

Brother QL-570 thermal label printerThe Brother P-Touch QL-570 label printer is a very capable unit for turning out labels or name tags on an ad-hoc basis and I would still consider it as being of use for these applications.