AT&T litigate against broadband-infrastructure-preparation by US local government

Article

AT&T sues Louisville to stop Google Fiber from using its utility poles | ARS Technica

AT&T sues Louisville over utility pole law adopted for Google Fiber | WDRB-TV (41) Louisville

WDRB TV news segment video – Click to view
WDRB 41 Louisville News

 

From the horse’s mouth

Google Fiber

Blog Post

My Comments

A situation that is surfacing in the USA is that AT&T are litigating the City Of Louisville, Kentucky because this local government are implementing a “one-touch make-ready” policy concerning their power infrastructure being made ready for the provision of competing Internet service.

What is “dig-once” or “one-touch make-ready”?

An issue that always surfaces with the “pits, poles and pipes” infrastructure managed by utilities and telecommunications providers is being able to prepare this infrastructure at an early point including positioning the existing operator’s wiring and equipment in a manner that subsequent operators can use those pits, poles or pipes. The idea is to avoid the waiting time that an operator (and their potential customers) have to face along with the disturbance associated with long high-noise construction activity that is needed to prepare infrastructure for another operator’s use.

This policy is know as “dig once” for underground infrastructure or “one-touch make ready” for overhead infrastructure.

The USA situation

Most of the power-line infrastructure between the substations and the end-users in the USA is owned by a city’s or county’s local government or a utility company owned or managed by that local government. AT&T, Comcast and other established operators don’t like the idea of a local government facilitating competitive Internet and pay-TV service so they have had state governments write laws to frustrate the provision of Internet service by local governments such as municipal Wi-Fi hotzones.

The fact that a local government implements a “dig-once” or “one-touch make-ready” policy on the infrastructure it owns is considered a threat to the incumbent operator’s monopolistic behaviour because it is simply facilitating a competitor’s access to the pits, poles and pipes owned by the local government or its public utilities entity. AT&T reckons that what happens with “pits, poles and pipes” is under the control of the state government rather than a local government and that they see it as “seizing” their property if AT&T’s wiring is rearranged by a local government or other entities preparing poles for access by other operators.

Who can effectively provide and manage “pits, poles, pipes and towers” infrastructure?

What is surfacing is a courtroom debate about how a local government or utility company can manage their “pits, poles and pipes” infrastructure in the context of facilitating the use of this infrastructure by other operators. Louisville’s local government, Google FIber and other organisations intent on seeing real competition in the USA’s fixed-broadband market are defending or providing moral support for the defence of this policy.

In some ways, this case could affect how access rights, leases and easements on private land for utilities and telecommunications services are granted; along with how independently-owned “pits, poles, pipes and towers” infrastructure is operated. This can range from a fire brigade providing space on its radio tower or a building owner leasing the top of their tall building to radio-based communications providers; a property owner providing a “once-and-for-all” easement for multiple local telecommunications providers to use; or an apartment block or similar development being wired up for one or more broadband services alongside the established telephony and cable providers.

Here, the question that could be raised is the amount of power established operators can have over the same physical infrastructure when it comes to admitting other operators and whether the infrastructure’s owners can set standards concerning the operators “wires’, antennas and equipment”.

This is a case that is of interest to anyone like public or private entities who are in a position to provide infrastructure along with service providers who want to provide competing telecommunications service.

Having trouble with Apple or similar headsets and your XBox One controller?

Article

Use Apple Earbud Headphones with Xbox One Controller Without the Buzzing Feedback Sound | OS X Daily

My Comments

JBL Synchros E30 headphones

Not all headsets may work fully and properly with all devices due to different wirings

The article showed a compatibility issue when it comes to using different wired stereo headsets with different communications devices, whether they be computers, smartphones or games controllers.

How are the headsets wired?

There are two ways of wiring a stereo headset’s plug where both of them use a 4-conductor 3.5mm phone plug. The tip and first ring in both wirings are for the stereo sound to the headset speakers but how the second ring and the sleeve are wired differ between the wirings.

XBox One games console press photo courtesy Microsoft

You could set the XBox One to work properly with your Apple or similar headset courtesy of a workaround

The CTIA wiring that Apple, Samsung and Sony uses for their phones and a great majority of headsets implement wires the second ring as the common or ground and the sleeve for the microphone. Conversely the OMTP wiring that Microsoft uses for their XBox One controllers and manufacturers like Nokia and a few Android handset builders has the second ring used for the microphone and the sleeve for the common or ground.

This problem can cause headsets that observe one of these wirings not to work properly with phones or other devices that observe the other wiring, such as with excessive noise or the microphone not working.

There are some ways to work around the problem. Firstly, you could purchase an OMTP / CTIA headset adaptor which is a plug-in jack adaptor that reverses the wiring so that an OMTP headset can be compatible with a CTIA device and vice versa. This can extend to having the headset’s plug wiring modified by a knowledgeable electronics technician to suit your device, something that could be done for “beer money”. If you have headphones that come with a headset cable, you could purchase another headset cable and have that modified to work with another device.

When I review headsets, I have raised this issue when it comes to headset connectivity and have suggested that headset manufacturers either supply a CTIA/OMTP adaptor plug or integrate a changeover switch for the affected connections into their headset or microphone pod designs. Similarly, device manufacturers could design their devices to work with both CTIA and OMTP headset wirings, something that can be facilitated at software level such as through a setup-menu option or auto-detect routine; or on a hardware level through a changeover switch on the device. The recent Lumia Windows smartphones have answered this problem by implementing a “universal headset jack” design.

There were other compatibility issues raised between headsets targeted at Apple devices and headsets targeted for other devices even if they were wired to CTIA specifications. This came in the form of the microphone’s impedance or how the buttons on the microphone pod send control signals to the host device.  But most of the other device manufacturers are answering this problem through the use of microphone-input circuitry that adjusts itself to the needs of the microphone that is connected to it. Similarly, the headsets are being required to effectively have their main control button short the microphone and ground (common) connections to signal the device for call-flow or media play-pause control.

Dealing with your XBox One’s controller

The headset jack on the XBox One’s controllers happens to be wired for OMTP which is also a common wiring method for regular computers, especially laptops. But, as highlighted in the OSX Today article, the Apple headset was wired up to CTIA standards.

But the author recommended a workaround to this problem by disabling microphone monitoring through the XBox One’s configuration menu. This is to reduce the buzzing associated with an electret-condenser microphone wired the wrong way, but may limit the headset’s functionality as a chat device when you play an online game for example.

Here, you have to enter the XBox One’s setup menu by double-clicking the XBox button on the controller, then select the “gear” icon to access the “Settings” menu. Then you have to turn the “Headset Mic” setting off and turn the “Mic Monitoring setting down to zero” to achieve this goal.

Personally, I would look towards purchasing a CTIA/OMTP adaptor online or through an electronics store and use this with the XBox One’s controllers so you can use the microphone on your Apple or other CTIA-compliant headset when you game online.

Huntsville integrates Google Fiber and a municipal fibre-optic network

Articles Welcome To Huntsville Gig City USA sign courtesy of City Of Huntsville, Alabama

Google Fiber is Coming to Huntsville, Alabama | DSL Reports

Google Fiber comes to Alabama through a city-run network | Engadget

Huntsville, Alabama, has NASA, US Missile Command … and now gigabit Google Fiber | The Register

From the horse’s mouth

Google Fiber

Blog Post

Sign-up / Notification page

City Of Huntsville, Alabama (local government)

Press Release

My Comments

It is easy to doubt that next-generation fibre-optic broadband would show up in Alabama, one of the most conservative of the states in the USA. But Huntsville, a city with 180,000 people, has taken the challenge.

This is because Huntsville has been found to be the best educated metropolitan area in Alabama and has been known as “Rocket City” due to the US Missile Command and NASA setting up shop there, thus leading to an increase in the number of engineers in that city.

The local government in Huntsville have, with the co-operation of Huntsville Utilities are laying down fibre-optic infrastructure as part of establishing a 21st-century smart power grid in that city. But they facilitated Google setting up their Google Fiber next-generation FTTP broadband service by leasing the infrastructure to Google Fiber. Tommy Battle, the Mayor of Huntsville and Jay Stowe, the CEO of Huntsville Utilities has put his weight behind this effort. As well, the arrival of Google Fiber in Huntsville would strengthen that city’s credibility as a tech centre especially where a lot of research data is being exchanged.

If Google were to set up their Google Fiber next-generation broadband network, they either would have to create their own network, purchase an existing fibre-optic network like a “dark-fibre” network or lease bandwidth on an operational network. By leasing the network from Huntsville Utilities, they would be foregoing the control they have over the infrastructure but would be saving on the start-up time and capital expenditure for establishing or increasing their footprint.

Hut Huntsville could explore the feasibility of allowing multiple competing ISPs and telcos to operate on this same infrastructure to open the path for increased service-level competition in that city. This is similar to what is being undertaken in a lot of Europe and Oceania where multiple operators are able to rent space on the same infrastructure.

It also is a way to prove to other US cities and states that municipal-owned or state-owned infrastructure that competes with the established “Baby-Bell” telco or cable-TV company isn’t necessarily a waste of taxpayers’ money as Comcast and AT&T would like us to believe. Rather the government can, through a separate entity, lease the infrastructure to competing operators and milk money from this leasing effort.

As well, this can be a chance for the communications industry to investigate the possibility of European-style service competition where competing services rent space on the same infrastructure and infrastructure owners can compete with each other when it comes to offering service to ISPs or enterprises.

Using school buses to provide Internet to poorer communities

Articles

Yellow school bus - Wikimedia Commons image courtesy of H, Michael Miley

These yellow school buses are being used not just for transporting schoolchildren but to provide Internet to poorer communities in the US

Wi-Fi-enabled school buses leave no child offline | PBS Newshour

Wi-Fi-Enabled Bus Connects Students in Poor Calif. Community | Education Week

What to do for kids with no internet at home? How about parking a wifi-enabled school bus near their trailer park? | Hechinger Report

How one of the poorest districts in the US pipes Wi-Fi to families – using school buses | The Register

My Comments

Coachella Valley in California is a rural community often associated with one of the trendiest rock music festivals in the USA. But when the musicians and fans pack up and leave this district, it reverts to having the attributes of a highly-disadvantaged rural community based primarily around trailer parks including lack of decent Internet access.

This is a situation that has been found to hold back secondary students who want to push on with their studies especially as today’s method of learning is focused towards online learning. One of many situations was that families were heading out to Starbucks or McDonalds or their schools’ parking lots to use the on-site Wi-Fi public-access Internet service. Another situation was a student staying back late at the school to complete an online assignment because their family couldn’t trust the Internet connection they had back at home.

But the Coachella Valley Unified School District have provided an innovative way of solving this problem by implementing in-vehicle Wi-Fi Internet connectivity in the school buses. Each bus implements a modem router connected to a mobile broadband service and dispersing the Internet access inside the bus and to 100 yards (91.44 metres) from the bus, similar to what some premium bus routes are doing. This network is set up for the school students to use through the use of particular software installed on the students’ tablets.

This setup would work when the vehicle is underway during a school-bus run but the school district wanted to run this setup with vehicles that are parked. They tried it out running the modem routers off the vehicle’s batteries alone but it could run for an hour with the batteries not providing enough juice to start the bus’s engine after that hour.

So one of the teachers put forward a solar-based solution to supply enough power from a roof-mounted solar panel array to run the modem router and in-vehicle network. Here, this didn’t put strain on the vehicle’s batteries thus avoiding the risk of losing the power needed to turn the engine over on a cold morning.

The buses would be parked in the trailer parks or near the communities so that students can wander down with their portable computing equipment to do the necessary study while under adult supervision. For example, if the community has a clubhouse or community hall, the bus would be near that facility.

There are further plans for the Coachella Valley Unified School District to take this concept further such as using donated or salvaged cars for the same purpose or even creating a community-access Wi-Fi Internet service. The usual remarks that I would most likely hear in relationship to enabling a disadvantaged community with real broadband is that such broadband services will end up being used for pornography viewing which would lead on to a downward family-abuse spiral.

Personally, I would also like to see the Coachella Valley Unified School District approach Google and others who roll out competitive broadband service to target the areas in the school district’s remit for competitive real-broadband service. Similarly, the school district could work toward helping the adults in their community by providing onsite public-access Internet facilities like an Internet café or Wi-Fi hotspot in these communities.

What needs to be answered about school-supplied technology

Lenovo ThinkPad Helix 2 connected to Wi-Fi hotspot at Bean Counter Cafe

Many questions need to be raised by knowledgeable parents about school-based IT programs

Parents often face a question when their child starts secondary school concernimg the technology that is being used as part of their education. This is more so with laptop computers that well be used at home to complete homework assignments and at school to take notes and do research.

Increasingly schools are supplying the families with the appropriate technology, typically with government and private-sector assistance. These computers may be supplied at a heavily-subsidised price so there isn’t much effect on the parent’s hip pocket.

But schools see this technology as part of their realm of control in your student’s life in a way that they see what the student does at home or away from school activities as bearing on the school’s name. This may be more so with privately-funded and similar schools where the school places a strong emphasis on their name and reputation.

These questions are worth raising during information nights or parent-teacher meetings that you will be engaging in during your child’s enrolment.

Is the technology sold or leased to your family by the school?

If you are acquiring the technology through the school, it is worth enquiring whether you are buying the computer so that you own the computer or whether you are leasing it or renting it on an annual basis where the school or school district has legal ownership over the equipment. This may include situations where you may borrow the computer for the duration of your child’s enrolment or for certain years but you may have to pay a bond on the equipment.

This can help with further issues regarding whether you can retain the computer to be used for the younger children or as a utility computer. On the other hand, it can also affect issues regarding maintaining the system and what happens in case of loss, theft or damage.

As well, it is worth finding out whether a technology-buyout program does exist where parents or students can purchase leased or rented computer equipment that they currently use from the school. This is important for equipment supplied to senior high-school students because most of the school-supplied technology programs require that the senior students relinquish their computers once they graduate from their senior years.

Such a buyout option can benefit both the school and student in different ways. The student benefits by being able to keep the computer as a personal computer through the years between their high-school graduation and their entry to tertiary or trade studies. The school also benefits because they aren’t keeping rapidly-depreciating assets on their books but can turn them over for cash which can be used to buy newer technology.

Who provides support in case of equipment failure or accident

Ask the school whether they have a maintenance programme for the school-supplied equipment. This includes what kind of minimum turnaround time exists if the equipment needs to be serviced. As well, does the maintenance programme cover for accidental equipment damage because students can easily end up being accident prone.

It may also include whether you have to pay to replace failed or damaged parts and whom you buy the replacement parts from.

Insurance coverage for theft and damage

To the same extent, it may be worth looking at your home-contents insurance policy to find out whether they provide coverage for equipment that is damaged or stolen while away from your home, including overseas. This may be of importance when your children go on the many field trips and school camps that will be part of their education; or when they engage in social activities with their friends.

Exchange-student programs

Your school may participate in an exchange-student program where one or more local students travel to another area, typically another country while the school hosts and teaches the students from one or more other areas. This is typically to encourage awareness of different cultures and increase knowledge of different languages.

Such programs typically will include overseas travel and having the participants stay in private households that are part of the participating school’s community. There are questions that will be raised if you end up hosting an exchange student or your child becomes an exchange student themselves.

If the school facilitates this program whether by itself or with a third party, you may have to find out where you or the school stands if the equipment belonging to your child who is overseas or the student you are billeting was stolen or damaged.

Similarly, your child or the student you are hosting may need assistance with connecting to different networks such as the host’s home network in the case of your child or your home network in the case of the guest student.

For that matter, it may be a good idea for schools, student-exchange agencies and students participating in exchange-student programs to read an article I wrote on this site about testing Skype across separate networks to make sure it works properly. This is because the videocall functionality in these programs can be used as a way for an exchange student to keep in contact with home and show what the “other” culture is about.

Can I configure the system myself?

An issue that is also being raised regarding school-supplied technology is whether you can configure the system yourself or perform remedial repairs on the system.

This may be to get the laptop to work with your home network, or to install any drivers to get it to work with the network-capable printers in your home. As well, you need to be sure that the school-supplied computer can gain access to other network resources and the Internet in a similar manner to other devices that exist on the home network.

Similarly, there is the issue of keeping the operating system and applications on these computers updated and patched to avoid these computers and the rest of your home network’s computers being the target for malware. Here, the kids’ computers could be updated with the latest patches whether they are at school or at home.

Different operating platforms

This issue of configuring the school-supplied laptop yourself also extends to coping with different computer platforms and operating systems. For example, you may find that the school supplies your kids a MacBook Pro as part of one of Apple’s education-technology programmes that the school is benefiting from, while you are more comfortable with the Windows-based computer you use at home. Similarly, the school may have all the computers running Windows 10 but you are pushing the barrel with Windows 7 on the work-home laptop that you normally use.

Here, you may be able to find out whether you can learn about the computing platform and operating system your school uses and how to configure it to work with your home network and peripherals.

How does the school handle a “bring-your-own” computer?

Another situation that is appealing to parents is the ability to buy their kid’s computer from a third-party retailer and have that as the computer thay use for school. This is typically due to the ability to purchase the system at a cost-effective price through a “back-to-school” special run by a major retailer or online and some governments may provide a benefit to families to assist with purchasing this education-related technology.

This concept is being facilitated also by the fact that the “bring your own device” concept is in full swing at workplaces and newer operating systems and software allows for a level of manageability in these situations.

Minimum standards for this computer

You should find out what the minimum standards are for a computer you supply yourself. The standards for the hardware should be based on the kind of CPU the computer must have, the amount of RAM and storage space the computer has, and the graphics subsystem and display resolution that the computer has to have. This also includes the minimum standard for the Wi-Fi interface for schools that implement a Wi-Fi network.

As for the software, you need to find out the minimum version and edition of the operating system along with the application software you need to have installed.  You may find that application vendors may supply a “student edition” of their software which is licensed for personal and education use only and some of these programs may be licensed for a small number of computers that are in the same household.

Use of a school-supplied disk image?

Some schools may require the use of a disk image that is managed by the school themselves in order to assure better control of the computer on the school premises. Here, you may find out whether you need to install this image and if you can get away with a dual-boot setup where you have a “home” operating environment and a “school” operating environment.

The better solution would be a USB stick or optical disk full of any courseware that is necessary for the curriculum, including any software that is required for the studies. The Internet use at the school environment can be controlled using the network hardware that runs the school’s network.

Can the system be maintained by the school’s IT staff?

It may also be worth inquiring whether the school’s IT staff are willing to provide maintenance and support for equipment that is brought to school on a BYO basis. Here, it may be about rectifying a system failure that occurs on that day or adding support for student-accessible peripherals that the school owns such as printers or sensor devices used as part of science experiments.

Computer-education courses for adults

In a lot of households where one or both parents aren’t computer-literate is that one or more of the teenage children end up providing assistance to the parents when it comes to personal-computing issues. This is typically due to the children learning many concepts regarding personal-computing through their school years.

It may also be worth finding out if your child’s school runs adult-focused courses about computer education. This may be of importance for those of you who haven’t had much education-based or workplace-based exposure to personal computing and will be of importance for people who do work that is primarily blue-collar.

Typically, the mode of delivery for these short courses would be evening classes taught by one of the school’s computing-science teachers. The school will usually charge for the courses and the students’ parents may pay a cheaper fee due to the fact that their child is attending that school.

Here, the courses should teach the essentials about knowing your way around your computer such as file management; along with safe computing practices. This should also include learning about keeping your computer system in top order like backups and keeping your software up-to-date. As well, such courses should highlight making effective use of the Internet and its online resources in a safe manner.

Some of the courses may offer tuition in other computing platforms like the Macintosh platform which may benefit adults who are used to, say, Windows learning about the other platforms and would come in handy if the school works on that different platform.

Conclusion

Once you ask the right questions from your child’s school’s staff, you can end up being an active participant in your child’s IT-focused education without fearing as though the school “owns you”.

Microsoft researches a way to consolidate recordings from multiple recording devices

Article – From the horse’s mouth

Microsoft Research

Abstract

Detailed article – PDF

My Comments

Sports scoreboard app

Microsoft is working on a way to create better recordings from many smartphones and audio recorders recording the same event

Microsoft has completed some research on how to amalgamate audio recordings of a meeting that were captured by different recording devices to turn out a higher-grade recording that captures the whole of a meeting. It is seen as being the audio equivalent of experiments and projects that aggregate multiple camera views of the same object, or could be seen as a way to create a “Claytons microphone array” using multiple recording devices with their own microphones.

The technique involves the creation of audio fingerprints of each of the recordings in a similar vein to what Shazam and its allies do to “name that song”. But these fingerprints are used to match the timing of each of the recordings to identify what was commonly recorded, allowing for the fact that one could start or stop a recording device earlier or later than another person.

This can lead to TV-grade multi-camera video recordings from a combination of DSLRs, high-end cameras and camcorders used by different users

This can lead to TV-grade multi-camera video recordings from a combination of DSLRs, high-end cameras like this one…

The technology that is assumed to be used in this context are standalone file-based digital notetaker recorders or the audio-recording function incorporated in many a smartphone or tablet typically by virtue of an app. Typically these recorders are recording the same event with integrated microphones and implementing automatic gain control and, in some cases, picking up their “own” background noise.

But you could extend this concept to integrating audio recordings made on legacy media like audio tape using standalone devices, or the soundtracks of video recordings recorded during the same event but are subsequently “dubbed” to audio files to be used in the recording. A good example could be someone who uses a “shoebox” or handheld cassette recorder to make a reliable recording of the meeting using something they are familiar with; or someone videoing the meeting using that trusty old camcorder.

Sony FRD-AX33 4K HandyCam camcorder press picture courtesy of Sony America

… and camcorders like this one of special events.

There are plans to create further research in to this topic to cater for recording music such as when the same concert performance or religious service is recorded by two or more people with equipment of different capabilities.

A good question to raise from the research is how to “time-align” or synchronise a combination of audio and video recordings of the same event that were recorded at the same time with equipment that has different recording capabilities. This is without the need to record synchronisation data on each recording device during production, and allowing for the use of equipment commonly used by consumers, hobbyists / prosumers and small organisations.

The reality that can surface is someone records the event using top-shelf gear yielding excellent audio while others film from different angles using camcorders, digital cameras and smartphones that record not-so-good sound thanks to automatic gain control and average integrated mics, while the good digital cameras and camcorders still implement their excellent optics and sensors to capture good-quality vision.

Once this is worked out, it could then allow a small-time video producer or a business’s or church’s inhouse video team to move towards “big-time” quality by using top-shelf audio gear to catch sound and the use of one or two camcorders operated by different operators to create “TV-studio-grade” multi-camera video.

Who knows whether the idea of post-production audio-level synchronising and “blending” for both conference recordings and small-time video producers.

B4RN progresses on bringing Gigabit broadband to rural North England

Article

B4RN Bring 1Gbps Broadband to 1,600 Rural Homes in North England | ISP Review

Previous Coverage

The soil has been turned for fibre-optic Internet in rural Yorkshire (14 January 2015)

A fibre network to cover Lancashire’s rural parishes (22 August 2011)

My Comments

Yorkshire Dales By Kreuzschnabel (Own work) [CC-BY-SA-3.0 (http://creativecommons.org/licenses/by-sa/3.0), GFDL (http://www.gnu.org/copyleft/fdl.html) or FAL], via Wikimedia Commons

B4RN reaches in to more of North England with real broadband

In 2011, there was a valiant effort that started off to cover parts of the north of England with real broadband Internet service. This was in the form of B4RN (Broadband For Rural North) which is a community effort that is based on local contribution including the contribution of personal effort to deploy the service. The standard of this service is a pure-play symmetrical Gigabit fibre-to-the-premises broadband service but B4RN are facilitating VoIP telephony in conjunction with Vonage, an American pure-play VoIP provider who has set up presence in the UK.

This effort has encompassed Yorkshire, Lancashire and Cumbria and there has been strong local interest and participation because of the fact that BT have been neglecting many rural areas. This state of affairs is something that a lot of people who dwell or work in rural areas sadly experience. The rollout has had the locals face many problems relating to its deployment and had them work out how to solve them.

Just lately, the B4RN effort has connected 1600 premises with 100 connected per month with the figure driven by the available effort. It has yielded a 65% service takeup with the price payable by end users being GBP£30 per month for the symmetrical Gigabit unlimited service and a GBP£150 connection fee.

As well, most of the original network, which encompasses 800km of core network, has been laid but the B4RN effort is expanding to more of rural North England. The same effort has been able to “pick up” areas where other projects have failed like Cumbria’s Fibre GarDen scheme.

I have read some accounts on the Yealands page where this network has enabled small businesses and community organisations. One of these is a small garage (Facebook link) who specialise in tuning cars for performance being able to exchange files with a partner based in Blackpool to modify engine-management units in order to performance-tune those cars. As well, the St. Johns Anglican church in Yealand which is one of those archetypal English village churches, ended up being connected to the B4RN broadband network and took advantage of this technology to “broadcast” a funeral service that they hosted to family members based in Sydney, Australia. They even want to take this further for sharing the wedding and funeral services that they host with participants who are separated by distance.

Like with Gigaclear, B4RN raised the issue of BT Openreach overbuilding their infrastructure but it may be seen as an effort to nawt because of a significant customer base who have invested in it. A question that may end up being raised is whether B4RN will end up becoming wholesale infrastructure for other retail ISPs rather than just an “end-to-end” provider. This would encompass the availability of multiple-play services via that infrastructure.

What B4RN is showing is that the rural areas have as much need for real broadband as urban areas and is highlighting that these areas can be about moving towards the country or starting a business there without losing the concept of real broadband.

The Nickname field is now of use for mobile assistant platforms

Article

Samsung Galaxy Note 2 smartphone

Android and iOS can support contacts’ nicknames with Google Now and Siri

Use Nicknames With Siri And Google Now To Reach Contacts Faster | Gizmodo

My Comments

Most smartphone operating systems have in their contact list a field called “Nickname”. This is typically of use when you have a personal nickname, relative-shortcut name like “Mum” or similar name for a contact. But in most cases, this field isn’t shown up on call logs or contact lists.

Now Siri and Google Now make use of the Nickname field to interpret instructions to call particular people. Google Now does provide inherent support for relationship-shortcut names but you can use the Nickname field for manually determining a contact’s nickname. Both voice assistants can query which person a nickname pertains to which can come in handy if you are calling one of many siblings or someone with an obscure nickname or a nickname that is spelt a certain way but pronounced another way.

How could this be improved upon?

Nicknames appearing in the contact-display context

At the moment, the nickname functionality only works in the contact-search context but I would like to see it also work in the contact-display context especailly when a call or text comes in from the contact or you browse through your contact list or recent / missed call logs. This could be facilitated through the use of a “Display As” field which shows a user-chosen field or combination of concatenated fields for a particular contact.

Support for a phonetic representation of a nickname

These systems could support the ability to store a phonetic representation of a nickname which can come in handy when you say that nickname one way but have it written another way. The phonetic representation would be used for voice-based search and voice-based call announcements.

Security issues with nicknames

Nicknames may expose security issues when they fall in to the wrong hands. It is because people use these nicknames as a “password” or “word of trust” within their community.  But confidence tricksters using familiar nicknames as a way to “get in to someone’s mind” and have them acquiesce to their inappropriate scheme. In some cases, a nickname that is a symbol of endearment may be used as a weapon against one or both of the participants.

Having nicknames as a “secure” field which is only shown to trusted users is important to preserve this kind of security. For example, if a phone shows a list of missed calls or text messages on the notification screen, it could show a standard “first-name last-name” or “company-name” while locked but show the nickname while unlocked. Similarly, voice-level biometrics can be used to authenticate a user who is “searching by nickname” using a voice-based personal assistant.

Further improvements needed for phone contact lists

Handling of common phone numbers

Another area where a lot of contact list programs miss out on is handling phone calls or other communication that comes in from pbone numbers, emails or other contact addresses common to two or more contacts.

The most common example is a landline phone number that serves as a “catch-all” number for a household, workgroup or business. In this case, you may instruct the voice assistant to call a person on that landline by saying “person-name Home” or “person-name Work” or something similar. This will place the call to that landline. The same thing will happen if you contact someone else who lives or works behind that common phone number.

The problem rears its ugly head when a call comes in from that phone number or you review your call logs and you see the first alphabetically-listed contact related to that “catch-all” number even though other contacts in your contact list are behind that number. Here you don’t know whom it was who called you or whom you placed that call to.

This could be facilitated using a dynamically-concatenated display field for phone numbers with something like [<company-name>(caller-name-1. caller-name-2, or caller-name-n] for callers with a populated company-name field; or [caller-name-1, caller-name-2 or caller-name-n] for callers missing a company-name field i.e. households. Or you may create a dedicated contact entry for the “catch-all” phone number such as a distinct “name-address-number” entry for a company or household. Then you add “common fields” like work number, home number or company name to the entries associated with the people with that same “roof” in common. The name associated with the dedicated contact entry shows up in the call log when you call that number or on your phone’s screen when they ring you from that “catch-all” telephone.

Conclusion

At least something is being done to make sure that the contact management software and voice-activated personal assistant software  is tied in to how we view our contacts so we see our contacts our way.

A code of conduct is now called for advertising bandwidth on UK small-business Internet services

Article

Ofcom extends speed code of practice to business broadband | ThinkBroadband

My Comments

Pantiles - Royal Tunbridge Wells picture courtesy of Chris Whippet [CC BY-SA 2.0 (http://creativecommons.org/licenses/by-sa/2.0)], via Wikimedia Commons

The Pantiles at Royal Tunbridge Wells – representative of a shopping strip with small businesses

Previously, I wrote an article about the main UK ISPs working on a code of practice for selling Internet service to small businesses. This is mainly about calling a minimum service quality for these Internet services.

But BT Business, Daisy Communications, KCOM, Talk Talk Business, Virgin Media, XLN and Zen Internet have agreed to a code of practice for selling business Internet service, which will come in to effect from 20 September 2016.

This code of service primarily affects the bandwidth and service quality concerning the business Internet service.

It calls for transparent accurate information on broadband speeds at the point of sale. This covers providing knowledge of estimated download and upload line-level speeds and, where available, the “real” throughput speeds as early as possible through the sale process. There will also be detailed information about the bandwidth of the service after the sale and on the ISP’s Website. The service speed that is disclosed has to be as accurate as possible and the ISP has to deliver this information to their resellers and solution providers who onsell the service.

If there are issues with the business Internet service not “hitting the mark” when it comes to throughput, the ISP has to manage these issues and help the business customer when that problem is raised by the customer.

The code of practice also include a “walk-out” right where the business custome can leave the Internet-service contract without penalty if the dowload speed falls below and is consistently below the agreed speed even after the ISP and business customer have had an opportunity to rectify the issue. Of course, the business would have to return any customer-premises equipment leased to them by the ISP.

A question that was called out in the article was whether a business customer on a multi-year contract could walk out due to substandard performance encountered during a time where the Internet service is overloaded at a time where residential users are placing intense demand on that service.

But there are a few gaps missing that may affect small businesses.

One of these is that the code of practice doesn’t apply to fixed-line-speed services like cable-modem services or fibre-to-the-premises services. Nor will it apply to “dedicated-line” business services like leased-line services, Ethernet-First-Mile services and Ethernet-over-FTTC services.

The Ethernet-over-FTTC service was called out in the article’s comment trail because it is offered as an entry-level dedicated-line service for small and medium businesses. Here, it is known to exhibit performance traits where the core-network bandwidth is predictable but the access-network bandwidth isn’t predictable.

But the commenters raised the possibility that a business could sign up to an Internet service that has a service-level-agreement which would cover situations and services beyond the code-of-practice’s scope. Similarly, could it be feasible for an ISP or telco to strike a service-level-agreement that is modelled on this code of practice and uses it as a fallback measure?

There is another issue that wasn’t addressed in this code of practice which can affect many small businesses and community organisations. It is where a business cannot see out a contract due to events in the business’s or organisation’s life-cycle such as when the business changes hands or the worst comes to the worst. Similarly, it doesn’t address a situation where a business changes location and the dynamics of the Internet service can be affected by that change.

At least a few steps are taking place to provide the same level of customer protection for small-business owners that consumers would enjoy when they sign up to Internet service.

New ISP players working against established players to provide competitive Internet service

Article

Gigaclear and Hyperoptic Highlight Problems with UK Broadband and BT | ISPReview.co.uk

My Comments

Aylesbury Vale countryside picture courtesy of Adam Bell (FlyingDodo)

Questions are now raised regarding independent operators providing real broadband to the countryside

The article I read in ISPReview has highlighted some problems that affect the existence of competitive next-generation broadband Internet service in the UK. These same problems can also affect other countries like those in the North American, South East Asian and Australasian areas to varying degrees.

It is based on interviews with Matthew Hare from Gigaclear, Dana Tobak from Hyperoptic and Scott Coats from the Wireless Infrastructure Group, all whom are running up against an incumbent telecommunications company who effectively owns the infrastructure in most of the country and is effectively given a fair bit of blessing from a national or regional government. This can be through state aid as part of a broadband-improvement scheme or through a legal “right of way” that proscribes competitors from operating in the area of concern. In the case of the UK, it is Openreach who is a BT spin-off that manages the telecommunications infrastructure in that country and they have been dominating the state-assisted “Broadband Delivery UK” projects that provide next-generation broadband to most of rural UK.

Apartment block

.. and apartment blocks in big cities

Issues that were raised were:

  • The dominance of a particular entity when it comes to delivering infrastructure for next-generation broadband in the UK
  • The costs associated with deploying new infrastructure
  • Business-hostile local-government property rates that affect the provision of service infrastructure by a private company, especially fibre-optic cable used for next-generation telecommunications
  • The difficulty of gaining access to the “pits, poles and pipes” infrastructure that BT Openreach owns or has exclusive access to; and
  • Whether BT and Openreach be fully and legally separated such as to make Openreach an entity controlled by the national government or local governments; or have it as a separate company.

Gigaclear are providing a 5Gbps fibre-to-the-premises service in to rural areas and commmuter towns in East Anglia and some of the Home Counties while Hyperoptic are providing a 1Gbps fibre-to-the-premises service to large multi-dwelling units in most of the UK’s main cities.

Gigaclear has effectively invested GBP£1000 / property and has found that the operating costs for pure-fibre setups are less than the costs for fibre-copper because there is no need to run electricity down the line and it is a modern robust technology. But they have paid many times the projected cost for some deployments like in Kent due to shodddy workmanship.

Matthew Hare from Gigaclear was highlighting BT swallowing up most of the BDUK contracts but he has picked up a few smaller Phase 2 contracts like projects in Gloucestershire, Essex and Berkshire. He had noticed a few of the local authorities being helpful about these rollouts like in Kent where Kent county council de-scoped (provided exclusive access) for Gigaclear projects compared to Rutlant where the Rutland county council and BT overbuilt Gigaclear with FTTC service.

This comes to the big question about whether an overbuild by one or more competing operators permit real infrastructure-level service competition. Some countries, most notably France have found that an overbuild by a competing infrastructure provider can achieve this level of competition.

Dana Tobak from Hyperoptic highlighted that fibre-copper technology like fibre-to-the-cabinet is a short-lived asset. She also highlighted the issue of access to the “pits, poles and pipes” owned by Openreach being a burdensome process for competing operators. This ranged from costs to onerous procedures and restrictions sucn as not being able to provide business broadband services.

There was also the issue of business-level property rates and taxes levied on the infrastructure where the workflow associated with these costs was onerous thanks to the Valuations Office Agency. This made it difficult for an operator to factor in the property rates due on the infrastructure when they are costing a rollout. To the same extent, the property taxes levied by a local government could be seen as a bargaining chip especially where the local government is behind the rollout in order to see effective increase in their local land value and tax base.

The question associated with an independent Openreach managing the infrastructure was whether this would breed real service competition. An issue that was highlighted was that Openreach could focus on the premium pure-fibre-based service and make life hard for small-time operators like regional-focused operators or startups who want ot serve the British market. But Matthew Hare reckons that it is better for the UK, especially rural areas to see Openreach as an independent operator.

Here, ISPReview have raised the issue of competitive next-generation broadband provision with independent “own-infrastructure” operators and covered some of the main hurdles facing these operators. This includes proper management of costs including infrastructure-based property taxes and rates; the creation of sustainable competition including build-over rights; incumbent operators’ behaviour including preferential treatment by governments; and access to the same  “pits, pipes and poles” by competing operators.