Australian media raises the issue of fake celebrity and brand endorsements

Article

Event page for spammy Facebook event

Facebook is one of many online platforms being used for fake celebrity and brand endorsements

Networks warn of fake ads, scams. | TV Tonight

Media Watch broadcast on this topic | ABC

My Comments

An issue that has been called out at the end of April this year is the improper use of endorsements by celebrities and brands by online snake-oil salesmen.

ABC’s Media Watch and TV Tonight talked of this situation appearing on Facebook and other online advertising platforms. Typically the people and entities being affected were household names associated with the “screen of respect” in the household i.e. the TV screen in the lounge room. It ranged from the free-to-air broadcasters themselves including the ABC who adheres strictly to the principles established by the BBC about endorsement of commercial goods and services, as well as TV shows like “The Project” or “Sunrise”, or TV’s key personalities like Eddie McGuire and Jessica Rowe.

Lifehacker Website

…. as are online advertising platforms

Typically the ads containing the fake endorsements would appear as part of Facebook’s News Feed or in Google’s advertising networks, especially the search-driven Adwords network. I also see this as being of risk with other online ad networks that operate on a self-serve process and offer low-risk high-return advertising packages such as “cost-per-click-only” deals and had called this out in an earlier article about malvertisement activity.

There has been recent investigation activity by the Australian Competition and Consumer Commission concerning the behaviour of the Silicon Valley online-media giants and their impact on traditional media around the world. It will also include issues relating to Google and its control over online search and display advertising.

Facebook have been engaging in efforts to combat spam, inauthentic account behaviour and similar activity across its social-network brands. But they have found that it is a “whack-a-mole” effort where other similar sites or the same site pops up even if they shut it down successfully. I would suspect that a lot of these situations are based around pages or ads linking to a Website hosted somewhere on the Internet.

A question that was raised regarding this kind of behaviour is whether Facebook, Google and others should be making money out of these scam ads that come across their online platforms. This question would extend to the “estate agents” and “landlords” of cyberspace i.e. the domain-name brokers and the Webhosts who offer domain names or Webhosting space to people to use for their online presence.

There is also the idea of maintaining a respectable brand-safe family-and-workplace-friendly media experience in the online world which would be very difficult. This issue affects both the advertisers who want to work in a respectable brand-safe environment along with online publishers who don’t want their publications to convey a downmarket image especially if the invest time and money in creating quality content.

As we see more ad-funded online content appear, there will be the call by brands, publishers and users to gain control over the advertising ecosystem to keep scam advertising along with malvertisements at bay along with working against ad fraud. It will also include verifying the legitimacy of any endorsements that are associated with a brand or personality.

A good practice for advertisers and publishers in the online space would be to keep tabs on the online advertising beheaviour that is taking place. For example, an advertiser can keep reporting questionable impressions of their advertising campaigns including improper endorsement activity while a publisher can report ads for fly-by-night activity that appear in their advertising space to the ad networks they use. Or users could report questionable ads on the Social Web to the various social network platforms they see them appear on.

Send to Kindle

Lenovo starts the Thinkbook line of small-business laptops

Articles

Lenovo’s new ThinkBook line offers ThinkPad-level features at a lower price point | The Verge

Lenovo’s new ThinkBook laptop line is built for slimness and security | Engadget

Lenovo launches less-expensive ThinkBook laptops | CNet

From the horse’s mouth

Lenovo

Thinkbook Series (product page)

Meet the New ThinkBook: Built for Business, Designed for Generation Next (Press Release)

Product Tour Video – Click or tap to play

My Comments

Lenovo ThinkBook 13s press picture courtesy of Lenovo

Lenovo ThinkBook 13s small-business notebook computer

HP and Dell have, for a long time, created a separate range of regular computers that stand between the consumer-class and enterprise-class product lineups. These product lineups known as ProBook in the case of HP or Vostro in the case of Dell were effectively targeted at small-to-medium business / community-organisation users or self-employed / freelance professionals.

Lenovo, Acer and some other computer manufacturers didn’t target this kind of user class effectively with a product lineup that answered their particular needs without adding to much extra functionality. Typically, the computers offered by these manufacturers wore the lower-tier models of the enterprise product range or the premium consumer products in their product lineup.

Lenovo ThinkBook 14S press picture courtesy of Lenovo

Lenovo ThinkBook 14s small-business notebook computer

But Lenovo have answered the small-to-medium-size organisation’s or freelancer’s needs by launching the ThinkBook product lineup targeted at these user classes. Here, they removed all the extra management features associated with enterprise-class computers, added the kind of multimedia features associated with consumer-grade products and presented them with a stylish look.

This satisfies the reality that this user class doesn’t run or contract an IT management and support team. Rather they have their solutions provider or an independent computer store provide the necessary after-sales support.

Similarly, this user class tends to work these computers as a “work-home” computer system which has to perform well in an all-round multimedia context as well as looking stylish for the home. It includes the fact that a significant amount of the small/medium business or freelance / self-employed user class places emphasis on doing at least some of their work from home.

Lenovo answered this situation by integrating an essential subset of security features in the form of a discrete TPM security chip along with a fingerprint reader that is integrated in the computer’s power switch. These work together to provide authentication for local or Web resources according the the “open-frame” FIDO2 standards. The camera also supports the end-user’s privacy through the use of a mechanical shutter over the lens that the user can slide back when they want to use the camera with Lenovo marketing it as the ThinkShutter.

There is also the business-class durability associated with the ThinkPad business product range built in to the new ThinkBook product range. This means that the small-organisation or freelancer user isn’t treated as a second-class citizen in this respect.

But the ThinkBook 13s and 14s which are clamshell laptops implement multimedia features like Dolby Audio and Harman sound tuning for the sound output and Dolby Vision colour management for the Full HD display. Both these laptops were also designed to have the stylish looks and are finished in a sliver housing rather than a black or charcoal-grey housing associated with business-grade computer equipment.

The ThinkBook 13s (13” screen) has the integrated Intel UHD 620 graphics whereas the ThinkBook 14s (14” screen) has AMD Radeon discrete graphics with AMD Dynamic Switchable Graphics operation. Both of them support Bluetooth 5.2 and Wi-Fi 5 (802.11ac) dual-stream for wireless operation along with a USB-C port and one of the two standard USB 3 ports supporting “Plug and Charge” operation when the computer is closed up.

The keyboard layout will be similar to most laptops on the market and it will use a normal touchpad and not have the IBM/Lenovo thumbstick associated with the ThinkPad. There are dedicated function keys for managing voice / video calls with Skype or other softphone / videophone software that responds to standard call-control function keys.

The ThinkBook laptop range are expected to appear at least in the North-American market by the end of May. But I would see this as a chance for Lenovo to build out a regular-computer product range dedicated to the small organisations and self-employed or freelancing professionals of this world.

It will also be a chance for more of the computer vendors to build up and identify out their “prosumer” products that fill the gap between consumer-focused and business-focused or professional-focused markets. This is through practices like designing products with the essential security, durability and reliability features but presented in a stylish form and capable of satisfying multimedia work and play activity.

Send to Kindle

Should we be managing multiple email accounts?

Windows Live Mail client-based email interface

Multiple email accounts may be beneficial to your privacy and work-life balance.

Some of us may find it convenient to handle all of our email through one account. The advantages that are often seen include dealing with one inbox and sending from one account.

But we are increasingly entering a world where we have to deal with multiple email accounts.

Why run multiple email accounts?

One reason this is becoming important is to keep business and private email separate. Here, it may be about preserving a separate business and social persona, or simply to delineate your time between home and work activity. Similarly, the separate email address for business / work email is an advantage in preserving a professional appearance.

As well, the correspondence associated with your personal email address that you maintain yourself isn’t subject to the same kind of legal scrutiny that the correspondence associated with your business email address would be subject to. This is important if your workplace or business is to change hands or is a party to legal action of any sort.

People who have a public-facing business life such as politicians or celebrities will maintain a public-facing email address to maintain an email correspondence consistent with that public-facing role. This is becoming more important where people in the public eye are becoming more vulnerable to “dirt-digging” – the practice of trawling for any information to discredit one’s reputation.

This practice is also becoming important with the emails we “tie” with various social-network presences. Here, we may want to operate a professional-looking persona on the public-facing social-media profiles while keeping a private persona that you have on your personal social-media profiles.

The situation extends to where we have our email address on material that the public have easy access to, whether it’s that notice on the church noticeboard or our entry on that petition.

Those of us who engage in online dating are having to find that maintaining a separate email address for use with dating apps and Websites gives us greater control over what potential suitors know about us. It may also offer a chance to control when they can contact us while keeping this life private from family or work.

Account types list in the Add Account option including option to add POP3 or IMAP4 accounts

It also applies to businesses and organisations who maintain a public-facing email address that is written on the public-facing material. This keeps a professional appearance and keeps your staff’s business and private email more private. Similarly, you can maintain multiple email address for particular job descriptions or workflow requirements.

Conversely, some of us maintain a separate email address that we give to marketers or online email newsletters as a crude method of spam control. Similarly, separate email addresses are being seen as important as a failover measure should one email server crash or as a security verification means for email services.

How is this achieved?

Who will provide the email inboxes

email settings in Samsung Android email app

Add Account option in email settings on Android (Samsung) email app

Your workplace will give you an email address that is tied to your tenure with that employer. The provision of a tied email address will also apply for most college students or staff who have access to college IT resources. If you run a small business or other organisation with a Web presence and own domain name, your Webhost or domain name provider will offer at least one email inbox under the main domain name you purchased.

Most ISPs or telcos will provide you with at least one email inbox as part of your Internet-service deal. It will be something that is very common with fixed-line Internet service especially from major providers.

Of course, there are the Webmail providers like Outlook.com and Gmail who will provide you at least one email address for free. It also includes the secure email hosts who provide a secure user experience at a premium price.

Now we are seeing the rise of dedicated service providers who provide email inboxes as their main business. Such providers will offer Web-based or standard client-based access to these mailboxes.

What to look for

Samsung Android email app account types

Account types offered by the Samsung Android email app

A feature I consider very important for email accounts is that they support multiple-device access and full “on-the-road” use. Typically it would mean use of a major Webmail host or a host that implements “hosted Exchange” or IMAP4 email protocols. This is important where we use a mobile device or secondary laptop computer to work our emails and want to work our email from anywhere.

You may find that a Webmail interface that allows the operation of multiple accounts from competing services may come in handy if you are using shared computers or public computing facilities.

How do you handle the multiple email inboxes

Different users may manage their email from multiple accounts using one of two paths. One is to use a single interface for all of the email accounts, with the other being to use different interfaces for different accounts.

It may include having all your personal email accounts operated with one interface like a Webmail interface while your work or business email accounts are operated with another interface like a business-optimised email client.

One email interface for all accounts

Most email interfaces, whether Web-based or client-based, will support the operation of multiple email accounts. In this case, using the one interface will underscore the idea of going to one email interface for all of your email activity.

Your email interface will have an option in its account-management settings to add or delete email accounts. Most of the current interfaces will have a “quick-setup” routine for the popular Webmail providers; and will have a setup option for accounts using Microsoft Exchange, POP3 or IMAP4 accounts.

Receiving email

The user experience for reading your email will have separate inboxes for each of the accounts you manage. You may also find that some of the email interfaces like the GMail Web interface may offer a combined-inbox view for all of your email accounts with better interfaces using visual clues to differentiate each account.

Sending email

Should you send an email, you will be asked to choose which account you use to send your email via.

On some email interfaces where you choose the account you are operating at the moment like Windows 10’s Mail app, the account you are operating would be the one you send your email via. Other interfaces may require you to determine which account you send the email from when you click the “Send” button. As well, most of these interfaces may offer a default-account setting for new email, with the option to override this when you compose your new message.

The default behaviour for replying and forwarding would be to use the email service you received the email via for sending the replies or forwarding the email.

Your contacts list

Of course the contact list kept in your email interface will, in most cases, be shared amongst all of the accounts you operate.

Different email interfaces for different accounts

On the other hand, some of us may choose to operate each inbox with its own interface setup. This may be due to an email client not handling multiple inboxes how we want it or simply to delineate the operation of each inbox as a separate task.

This is a simple task with operating each interface with its own account. You will have to copy across contact details you want to use across multiple accounts if you operate them with separate interfaces.

A combination of this situation and the former situation will apply if you choose to operate some accounts with one interface and others with another interface. This is a useful practice for those of us who want that “church and state” separation between business and personal or public and private email activity.

Conclusion

Operating multiple email accounts may come in to play as a measure to protect your privacy and manage our email inbox properly.

Send to Kindle

The UK to mandate security standards for home network routers and smart devices

Articles UK Flag

UK mulls security warnings for smart home devices | Engadget

New UK Laws to Make Broadband Routers and IoT Kit More Secure | ISP Review

From the horse’s mouth

UK Government – Department of Digital, Culture, Media and Sport

Plans announced to introduce new laws for internet connected devices (Press Release}

My Comments

A common issue that is being continually raised through the IT security circles is the lack of security associated with network-infrastructure devices and dedicated-function devices. This is more so with devices that are targeted at households or small businesses.

Typical issues include use of simple default user credentials which are rarely changed by the end-user once the device is commissioned and the ability to slip malware on to this class of device. This led to situations like the Mirai botnet used for distributed denial-of-service attacks along with a recent Russia-sponsored malware attack involving home-network routers.

Various government bodies aren’t letting industry handle this issue themselves and are using secondary legislation or mandated standards to enforce the availability of devices that are “secure by design”. This is in addition to technology standards bodies like Z-Wave who stand behind logo-driven standards using their clout to enforce a secure-by-design approach.

Netgear DG834G ADSL2 wireless router

Home-network routers will soon be required to have a cybersecurity-compliance label to be sold in the UK

The German federal government took a step towards having home-network routers “secure by design”. This is by having the BSI who are the country’s federal office for information security determine the TR-03148 secure-design standard for this class of device.  This addresses minimum standards for Wi-Fi network segments, the device management account and user experience, along with software quality control for the device’s firmware.

Similarly, the European Union have started on the legal framework for a “secure-by-design” certification approach, perhaps with what the press describe as an analogy to the “traffic-light” labelling on food and drink packaging to indicate nutritional value. It is based on their GDPR data-security and user-privacy efforts and both the German and European efforts are underscoring the European concern about data security and user privacy thanks to the existence of police states within Europe through the 20th century.

Amazon Echo on kitchen bench press photo courtesy of Amazon USA

… as will smart-home devices like the Amazon Echo

But the UK government have taken their own steps towards mandating home-network devices be designed for security. It will use their consumer-protection and trading-standards laws to have a security-rating label on these devices, with a long-term view of making these labels mandatory. It is in a similar vein to various product-labelling requirements for other consumer goods to denote factors like energy or water consumption or functionality abilities.

Here, the device will be have requirements like proper credential management for user and management credentials; proper software quality and integrity control including update and end-of-support policies; simplified setup and maintenance procedures; and the ability to remove personal data from the device or reset it to a known state such as when the customer relinquishes the device.

Other countries may use their trading-standards laws in this same vein to enforce a secure-by-design approach for dedicated-function devices sold to consumers and small businesses. It may also be part of various data-security and user-privacy remits that various jurisdictions will be pursuing.

The emphasis on having proper software quality and integrity requirements as part of a secure-by-design approach for modem routers, smart TVs and “smart-home” devices is something I value. This is due to the fact that a bug in the device’s firmware could make it vulnerable to a security exploit. As well, it will also encourage the ability to have these devices work with highly-optimised firmware and implement newer requirements effectively.

At least more countries are taking a step towards proper cybersecurity requirements for devices sold to households and small businesses by using labels and trading-standards requirements for this purpose.

Send to Kindle

20 Years of Wi-Fi wireless

From the horse’s mouth

Wi-Fi Alliance Wi-Fi Alliance 20th anniversary logo courtesy of Wi-Fi Alliance

20 Years of Wi-Fi (Press Release)

My Comments

“Hey, what’s the Wi-Fi password here?”. This is a very common question around the home as guests want to come on to your home network during their long-term visit to your home. Or one asks the barista or waiter at the cafe “Do you have Wi-Fi here?” with a view to some free Internet use in mind.

“What’s the Wi-Fi password?”

It is brought about by Wi-Fi wireless-network technology that has become a major lifestyle changer over the last 20 years. This has been propelled in the early 2000s with Intel advancing their Centrino Wi-Fi network-interface chipset which put forward the idea of highly-portable computing.

Dell XPS 13 9380 lifestyle press picture courtesy of Dell Corporation

The laptop like this Dell XPS 13 – part of the Wi-Fi lifestyle

The laptop computer, mobile-platform tablet and smartphone benefited from Wi-Fi due to their inherently-portable nature. This effectively allowed for “anywhere anytime” online work and play lifestyle including using that iPad or smartphone as a second screen while watching TV. Let’s not forget the use of Internet radios, network-based multiroom audio setups and those smart speakers answering you when you speak to them.

“Do you have free Wi-Fi here?”

Over the years there has been incremental improvements in bandwidth, security and quality-of-service for Wi-Fi networks both in the home and the office. Just lately, we are seeing home networks equipped with distributed Wi-Fi setups where there are multiple access-point devices working with a wired or wireless backhaul. This is to assure full coverage of our homes with Wi-Fi wireless signals, especially as we face different floorplans and building-material types that may not assure this kind of coverage.

But from this year onwards, the new Wi-Fi network will be based on WI-Fi 6 (802.11ax) technology and implement WPA3-grade security. There will also be the idea of opening up the 6GHz wavebands around the world to Wi-Fi wireless-network traffic, along with having support for Internet-of-Things applications.

Telstra Gateway Frontier modem router press picture courtesy of Telstra

The Wi-Fi router – part of every household

The public-access Wi-Fi networks will be more about simple but secure login and usage experiences thanks to Wi-Fi Passpoint. This will include simplified roaming between multiple Wi-Fi public-access hotspot networks, whether this is based on business relationships or not. It will also lead to telcos using Wi-Fi networks as a method to facilitate complementary coverage for their mobile-broadband networks whether they use current technology or the new 5G technology.

What needs to happen for Wi-Fi is to see work take place regarding high-efficiency chipsets for Internet-of-Things applications where such devices will be required to run on a small number of commodity batteries for a long time. One requirement I would like to see for public-access Wi-Fi is the ability to create user-defined “secure device clusters” that allow devices in that cluster to discover each other across the same public-access network but other devices outside of the cluster can’t discover them.

So happy 20th Anniversary to the network technology that has effectively changed our online lifestyle – the Wi-Fi wireless network.

Send to Kindle

Dell issues a security advisory regarding its SupportAssist software

Article

Dell XPS 13 2-in-1 Ultrabook at Rydges Melbourne

Check that the SupportAssist software on your Dell computer like this XPS 13 2-in-1 is up-to-date to keep a secure computing environment

Dell Computers Exposed to RCE Attacks by SupportAssist Flaws | BleepingComputer

From the horse’s mouth

Dell

DSA-2019-051: Dell SupportAssist Client Multiple Vulnerabilities (Support Notice)

Official Resources

Dell software download site

https://downloads.dell.com/serviceability/Catalog/SupportAssistInstaller.exe (Official software installer)

My Comments

A version of Dell’s SupportAssist computer-maintenance software that is currently installed on most recent-issue Dell desktop and laptop computers, including some of the Dell laptops reviewed on this site, has been found to have a bug that is a security issue. This bug will affect versions of this software prior to 3.2.0.90 .

Here, the bug exposes the SupportAssist software to a vulnerability that allows malicious code to be executed remotely. At the moment, it appears to happen on the same logical network, which can be a vulnerability for users using public-access networks that aren’t properly configured for client isolation.

It was discovered by a teenage software researcher called Bill Demirkapi, but other flaws regarding verification of software provenance were found in the prior versions of this software by another software researcher called John C. Hennessy-ReCar. Here, Dell practised responsible disclosure in reporting the SupportAssist software vulnerability and made sure there were newer properly-patched versions of this software.

A newer version (3.2.0.90) of this software has been released and made available to download from Dell’s servers. I have placed the link to the installer package and Dell’s software download site so you can make sure your computer is up-to-date. The software download site also has a “Detect PC” button to allow the site to properly identify the Dell computer it is being used from incase you find it difficult to properly identify the exact model yourself. You may also find that the existing SupportAssist software may update itself or suggest an update when it checks Dell’s servers for new software versions.

As well, copy the SupportAssist installer application referenced here to a USB memory key or portable hard disk because your system may keep the prior version of this application in its recovery partition and you would be running that version should you have to restore your computer from that partition.

A good practice that I would like to see regarding “recovery partitions” on today’s computers is to have a user-selectable option to “slipstream” or update these partitions with newer software versions. This can be of importance with major or minor revisions to the operating system or updated application, driver and support software.

It may be a good practice when you buy a prebuilt computer to visit its manufacturer’s support resources regularly to check for new software updates for hardware drivers or support software. You may also be alerted to any issues that you might come across with this system. As well, registering your system with the manufacturer may be of value when it comes to being alerted to software or hardware issues.

Send to Kindle

The battle’s on for streaming-music services

Articles

Spotify Windows 10 Store port

Spotify’s ad-supported free music service faces competition from Amazon and Google

Free ad-supported service tier

Amazon Music’s free ad-supported tier goes live, but only for Alexa users | The Verge

Amazon and Google Are Making Music Free — And That Could Be a Big Headache for Spotify | Rolling Stone

Hi-Fi-grade premium service tier from Amazon

Amazon may be working on a high-fidelity music streaming service | Engadget

Amazon Planning To Hi-Fi Music Streaming Service: Report | Android Headlines

Amazon Music rolls out a lossless streaming tier that Spotify and Apple can’t match | The Verge

From the horse’s mouth

Amazon

Amazon Music HD (Product Page – Sign up here)

My Comments

The Silicon Valley establishment are realising that other companies are offering streaming-music services that offer service options that they don’t provide in their own services.

Ad-supported free-to-end-user service tier

Amazon Echo on kitchen bench press photo courtesy of Amazon USA

The Amazon Echo will benefit from Amazon’s free music service

One of these is a free-to-end-user service option which is supported by audio advertising that plays in a similar manner to commercial free-to-air music radio.

Spotify had, for a long time, established its streaming-music service on a “freemium” model with an ad-supported basic service tier free to the end-user. This is alongside their Premium service tier which can be fully enjoyed on your mobile device or Spotify Connect endpoint audio devices and without advertising.

The advertising models included display advertising on the user interface along with radio-commercial-type audio ads at regular intervals. They also offer to marketers advertising ideas like sponsored playlists or sponsored listening sessions.

Now Amazon and Google are offering a free-music ad-supported streaming tier for their “online jukeboxes” but this will be limited to their smart-speaker platforms rather than a Web-based or mobile-based experience. There will also be a limited music offering available through this music tier.

Premium hi-fi-grade service tier

Cambridge Audio / Rega hi-fi system

Amazon to undercut Tidal and Deezer when delivering a streaming music service fit to play through hi-fi equipment

The other is a premium streaming service that yields at least CD-grade audio fit to be played through that hi-fi system rather than an experience similar to FM radio.

TiDAL and Deezer based their music-streaming service on listeners who value high-quality sound for a long time. You may have heard music streamed from one or both of these services if you have recently attended a hi-fi show like any of the Chester Group hi-fi shows where I have heard TiDAL in action, or visited a boutique hi-fi or home-AV store.

Amazon aren’t taking this lightly and are offering the HD and Ultra HD service tiers which are the hi-fi-grade premium service tiers for their Amazon Music Unlimited streaming-music service. This is priced at US$15 per month with a view to undercut TiDAL and Deezer and is also targeted towards people who use Alexa-platform audio devices with their hi-fi system or use an Alexa-based network multiroom setup.

The Amazon service offers the high-quality service as two tiers – the HD one that is equivalent to CD quality and the Ultra HD one that is equivalent to “master quality”. These use the FLAC codec to trasfer the music to your equipment and you may find that the HD tier is similar to what you get if you are “ripping” a CD to FLAC files with, perhaps, Windows Media Player in Windows 10.  They are working with the record labels to license their music libraries to this service in order to have more high-grade content.

What is this to lead to

I see this opening up the floodgates for a highly-volatile streaming-music service market with companies wanting to cut in with entry-level free tiers driven by advertising or premium hi-fi-grade subscription tiers for those who value high-quality sound. Here, I would see at most of these companies running a three-tier music service for consumers – an ad-supported limited-content free service, a standard package with the whole library delivered ad-free and a premium package that has access to the whole library with CD-grade or master-grade audio.

There will be some factors that will allow each streaming-music service to differentiate themselves in a crowded market. They will become more important as a way to attract new subscribers or retain their existing subscriber base. It will also become important in encouraging people who have subscriptions with all of the services to focus their attention to a particular service.

One of these would be the quantity and quality of music playlists, especially curated playlists. Another would be the richness of information available to the user about the performers, composers, genres and other factors regarding the music library.

There will also be whether the music library contains underrepresented content and how much of this content is available to the users. This includes whether they offer a classical-music service with the expectations of such a service like composer-based searching.

Another issue that will show up is the provision of client-side support in standalone audio equipment so you aren’t running extra software on a computer or mobile device to get the music from that service to the speakers. This will also include having software for these services integrated in your car’s dashboard.

There will be the issue of what kind of partnerships the streaming-music service provider can have with the business community. It ranges from  “business music” service tiers with music properly licensed for public-performance on business premises to advertising and sponsorship arrangements like what Spotify has achieved.

As far as the creative team behind the music is concerned, a differentiation factor that will come about is how each streaming-music service renumerates these teams. It is whether they are the composers, arrangers, lyricists or music publishers behind the songs or the performers and record labels behind the recordings.

There will also be the issue of encouraging other vendors to tie-in streaming-music subscription as part of a package deal. This could be through an ISP or telco providing this service as part of an Internet or mobile-telephony service plan. Or buying a piece of equipment like an Internet radio could have you benefit from reduced subscription costs for a particular streaming-music service.

What I see of the online music-streaming market is something that will be very volatile and competitive.

UPDATE

19 September 2019 – Amazon formally launches the HD and Ultra HD hi-fi-quality service tiers for their Music Unlimited streaming service.

Send to Kindle

Lifestyle publishing heads towards the online trend

Lifehacker Website

Lifehacker – an example of the new direction in online-based lifestyle publishing

The online life has placed significant changes in the realm of “lifestyle publishing”.

What I would describe as “lifestyle publishing” are print or online publications that primarily cover lifestyle issues like living at and keeping our homes, parenting, personal health and personal / relationship issues. This kind of content is seen as being evergreen and relevant for a long time.

The classic “women’s magazines” maintained this role while running celebrity gossip and similar material. They existed in a position where they were available in the checkout lanes at supermarkets or at general/convenience stores and newsagents. As well, prior issues would exist in the waiting rooms at most medical practices and, of course, they would exist on many coffee tables as casual reading.

Some of these magazines even provide activities like crosswords and other puzzles or provide colouring-in pages and similar activities for children. This is to enhance the value of the magazine across the reader’s household. You may also find a few comic strips in the magazines as another content type.

They have been supported by various magazines that focus on particular topics like cookery, home improvement, parenting and health. It is also along with those salacious gossip magazines filled with lurid details of what the TV stars, the European royal families or other celebrities are up to.

Mamamia Website

… as is Mamamia

But, thanks to the smartphones and tablets, the direction for this kind of publishing has headed towards two major online paths. These devices have provided a portable and discreet means to consume this kind of material whether at home or out and about, in a similar way to how the e-book has been a boon to the romance novel and similar popular “guilty-pleasure” reading.

One of these are the independent blogs and small-time Websites, especially the “mum blogs”. These blogs appear on their own site or purely on a social-media platform like Facebook. People who follow the independent sites and blogs consider them authentic due to them representing the voice of the site’s or article’s author and their experiences.

MillieMummyMelbourne mum blog

… and “mum blogs” like MillieMummyMelbourne

The other fork in the road are the likes of Fusion Media Group and Pedestrian TV who maintain a large powerful blog/Website network with names like Lifehacker and Gizmodo. In this case, Fusion Media Group are franchising some of their mastheads in to other countries in a similar manner to what the Daily Mail and The Guardian are doing. It includes providing localised content for these markets as well as content that appeals across the world.

Another example of the other fork in the road is Mamamia who is becoming a powerful online “women’s magazine” focusing on what women really want. But this masthead is moving away from the traps associated with the salacious celebrity-gossip culture such as relying on imagery supplied by paparazzi photographers.

The online lifestyle publications don’t just provide content in the written form augmented with photos or other imagery. Increasingly these publications are providing audio podcasts or short videos in addition to the written content. Here, it is positioned as another way to present the same information that the site provides.

Lenovo Yoga Tab Android tablet

These mobile tablets play in to the hand of the online lifestyle publishers

Some of these online lifestyle-publishing mastheads are doing some things that aren’t really associated with the traditional women’s mags. One approach has been to review and compare different products that exist on the market and are relevant to their reader base.  This was a practice that was typically saved for car, boat, photo/audio/video and similar magazines or magazines offered by consumer-rights organisations.

But independent bloggers like the “mum blogs” are undertaking this role by reviewing or comparing household and similar goods. In some cases, the vendors supply the review samples of these goods, especially newer products, in order to have them put in the public consciousness.

There will be some continual questions raised about online lifestyle publishing.

One of these will be about monetising the content. This is more so where people are using social media, online content aggregators or email to follow the sites and read the latest content they offer.

Dell Inspiron 13 7000 2-in-1 Intel 8th Generation CPU at QT Melbourne hotel - presentation mode

.. as do the popular 2-in-1 convertible laptops like the Dell Inspiron 13 7000 2-in-1 range

This situation may affect the viability of on-site display advertising as a monetisation strategy. It is even though most of these publishers don’t have difficulty in creating family-friendly brand-safe content which can attract the advertisers to their Website.

One way this issue has been targeted is through the provision of sponsored content on these sites. The article or articles will have some input from a brand and be published with the brand’s identity appearing at various points in the article. This may also include the supply of goods and services at no cost to the blogger in exchange for them to write up a review about them like in the MillieMummyMelbourne blog regarding LEGO Duplo Stories with Amazon Alexa.

Some people see the existence of sponsored content or product reviews based on vendor-supplied samples as not being authentic. This is because they see the vendors or brand owners effectively steering the discussion regarding the goods or services being offered with the publishers extolling the advantages of these goods. This is something that has happened across lifestyle publishing in the traditional media with the use of advertorials within the magazines or infomercials being run during morning TV.

Another approach has been to run an online storefront that offers merchandise promoting the Website or designed by the author. It is more so where the author has the creative ability to design their own merchandise like clothing for example.

Another issue that will crop up is how to position online lifestyle publications in a manner to make them discoverable.

At the moment, discovery of this content is primarily through Google, Bing or other search engines especially where the search engine may surface a list-driven article written somewhere on the Internet that compares and describes the sites you are after. This takes over the role of the browsing-driven Internet directories like Lycos which existed before the Google behemoth came to the fore where Web providers could submit links to their sites to these directories.

As well, some of the online content aggregators like Feedspot or Feedly do provide the ability to search or browse for content of a kind. Similarly Web portals could be used as a tool to place online lifestyle publications “on the map”, perhaps through the use of a dedicated “lifestyle” Web portal promoted through traditional media.

Use of native or Web apps that show up strong with iPads, Android tablets and similar devices cam be a way to keep that “magazine experience” alive when you are “flicking” through these online lifestyle publications or “mum blogs”.

What needs to be done regarding online lifestyle publishing is to raise the profile of this segment to a position comparable with the traditional printed magazines. There was an episode of ABC’s “Media Watch” comparing them against the traditional womens’ magazines but this was showing concern about the sponsorship and brand-interaction issue.

Here, it was a way to use traditional media to put these blogs and sites on the map, but other resources can be used equally as well. For example, a radio or TV talk show could be used as a platform to interview lifestyle bloggers including “mum bloggers” and place them on the map. Or traditional media can exchange content with the lifestyle Websites and blogs to, perhaps, enrich coverage of a particular topic or cross-promote resources.

What needs to happen is to increase the profile of the online publications and blogs in the context of lifestyle-focused publishing especially in the eyes of the casual readers.

Now lifestyle publishing has headed towards the online direction and is coming to a tablet computer near you.

Send to Kindle

Yale uses modules to extend smart-lock functionality

Article

Use of a user-installable module allows these Yale smart locks to work with different connected-home systems

Yale Expands Assure Lock Line With New Smart Lever Lock | Z-Wave Alliance

My Comments

Yale have implemented the smart-lock approach in a very interesting way ever since that company released their Real Living Connected Deadbolt in to the North-American market.

Here, they designed an electronic lock as a basic platform device but built an expansion-interface arrangement in to this lock’s design. Here, users could install a retrofit module in to the battery compartment on the door’s inside to add on Zigbee, Z-Wave or August smart-lock connectivity to their lockset.

This approach has been rolled out to the Assure range of electronic deadbolt locks and lever locksets with the use of the same module type for the whole range. It also applies to the Lockwood Secure Connect product range offered in Australia which is based on the Yale designs.

A similar approach has been implemented in the UK for some of the Yale electronic door locks sold in that market. But the modules used with the UK locksets are different to the North-American modules due to the regional differences that affect how Z-Wave and Zigbee operate and the country’s preferred building-hardware form factors. One of these units is infact designed to replace the outside cylinder on a rim-mounted nightlatch or deadlatch to enable “smart lock” functionality to this common class of door lock.

All these modules are expected to be installed in a “plug-and-play” fashion where they simply add the extra functionality to the lock or bridge it to the smart-home ecosystem once you install the module. After you install these modules in the lockset, the only thing you need to do is to pair them with the smart-home or integrated-security ecosystem.

Even within the same form-factor, the electrical interface for these modules may be varied for later products which can raise compatibility issues. Similarly, some of the home-automation integrators tend to presume that a particular module will only work with their system.

They also work on a particular “Internet-of-Things” wireless interconnection rather than an IP-based home network, requiring them to use a network bridge to work with an online service. This bridge is typically provided as part of a security-and-home-automation ecosystem whether offered by a telco, security services firm or similar company.

What have I liked about this approach is the use of user-installable modules that are designed to work across a particular Yale smart-lock range. Here, these modules interlink with Yale or third-party smart-home setups with the ability to be replaced should you decide to move to a better home-automation system that uses a different Internet-of-Things interface.

It underscores the fact that, once installed, a door lock is expected to be in service for a very long time and this same requirement will be placed upon smart locks. This is even though new smart-home or smart-building technologies will appear on the horizon.

It is similar to how central-heating systems are being enabled for smart-home operation through the use of a room thermostat that has the “smarts” built in to it. These thermostats are designed to be powered by the host HVAC system and connect to that system according to industry-standard wiring practices that have been determined and evolved over a long time.

This approach can be taken further with other devices like major appliances that are expected to serve us for a long time. Even if a manufacturer wants to create an ecosystem around its products and accessories, it needs to keep the specifications for interlinking these products and accessories the same to allow users to implement newer devices in to the system.

It can also work properly with a self-install approach where the customer installs the necessary aftermarket modules themselves or a professional-install approach which involves a technician installing and commissioning these modules. The latter approach can also work well with manufacturers who offer “functionality” or “upgrade” kits that enable the use of these modules.

The ASSA Abloy approach to making sure your smart lock works with the smart-home system by using user-replaceable modules makes sense for this class of product. Here, you are never worried about the smart-lock ability being “out of date” just because you install a home-automation setup that suits newer needs.

What needs to happen with the retrofit approach is that the physical and electrical interface for add-on modules has to be consistent across the product range or device class for the long haul. There also has be be some form of compatibility should any design revisions take place. Similarly, using a common application-level standard can work well with allowing the same device and retrofit module to work with newer systems that adhere to the relevant standards.

These expectations may not really work well with system integrators, telcos and the like who prefer to be the only source for products that work with a smart-home system.

Here, it is the first time I have noticed a smart-home device designed to be upgraded over its long service life.

Send to Kindle

WPA3-Personal security–What does this mean for your Wi-Fi network

Article

Telstra Gateway Frontier modem router press picture courtesy of Telstra

Expect the next-generation Wi-Fi network to have WPA3 security

What is WPA3? And some gotchas to watch out for in this Wi-Fi security upgrade | Network World

My Comments

Over the next few years, Wi-Fi routers, access points and client devices like computers and smartphones will be supporting WPA3 as a media-specific network security protocol.

At the moment, I will be focusing on the WPA3-Personal variant which is relevant to small networks like the typical home or small-business network. This kind of network security is also implemented in an increasing number of venue-based public-access networks in order to allow the venue owner to protect and authenticate the network and preserve its role as an amenity for the venue’s customers.

The WPA3-Personal network security protocol has the same method of operation as for a WPA2-Personal network. This is using a “Wi-Fi password” commonly known across all access points and client devices that use the network segment.

But it describes this “Wi-Fi password” as Simultaneous Authentication Of Equals rather than the previous Pre-Shared Key used in previous WPA-Personal implementations. It also affects how this “Wi-Fi password” is represented and encrypted in order to protect it against an off-site brute-force cracking attempt.

As well, each connection between the client device and the access point is encrypted in a manner unique to that connection.

The initial onboarding process will be typically based on the traditional password-entry method. But it will also implement Wi-Fi EasyConnect which uses a QR code or WPS-based push-button setup.

The Wi-Fi WPA3 security protocol may take years to become mature while a secure surefire codebase for client-side and access-point-side implementations is worked out. The initial codebase was found to have software weaknesses in the early Personal-setup implementation and is being debugged now.

A question that will be raised is whether an upgrade to WPA3 security will require new hardware for either the client device or the access point or if this can be performed using revised firmware that has the necessary software code. This may depend on whether the hardware uses a purely software-defined approach for managing its functionality.

There will be situations that will take place regarding existing equipment and WPA3-capable equipment. Here, a WPA3 client like a smartphone can work with an existing WPA2-compliant Wi-Fi network segment but not have the full benefits. Similarly, a WPA3-capable Wi-Fi network segment will need to be operated in a “transition mode” to allow existing WPA2-compliant client devices to connect. Again, this doesn’t provide all the benefits of a Wi-Fi network segment secure to WPA3 standards.

You can also work around this limitation by implementing two Wi-Fi network segments that have separate ESSIDs. One of these could be configured to work the current WPA2-Personal standard while the other is set up purely for WPA3-Personal. This practice may come in to its own if you have a Wi-Fi network using the latest standards while you maintain another using tried-and-trusted standards.

Send to Kindle