Why do I still buy and rip CDs for my online music library?

Sony MAP-S1 network-capable CD receiver - an example of good CD-playing hi-fi equipment

Sony MAP-S1 network-capable CD receiver – an example of good CD-playing hi-fi equipment

When the idea of MP3s came along and there weren’t much in the way of online “download-to-own” music stores as a legitimate online music source, the way to build your online music source was to buy CDs and “rip” them to your hard disk.

What was this, you may ask? Here, you use a music management program like iTunes or Windows Media Player to copy the digital audio from your CDs to your computer’s hard disk and make each track its own audio file based on a certain standard. Such programs work with one or more music-metadata sources like Gracenote, AllMusic or FreeDB to obtain the details about the album and who performed on it to identify each of the recordings.Then we play the music from the computer’s hard disk using the music management program. For portable enjoyment, you would “sync” albums, playlists or tracks out to your portable MP3 player or smartphone, or to removable storage like an SD card or USB memory stick.

Windows Media Player ripping a CD

Software media managers like Windows Media Player can rip CDs to files

I would personally “rip” my CD collection to 192kbps WMA files which have been considered efficient yet able to come across at a quality equivalent to the 320kbps MP3 file. The WMA and AAC files use proprietary algorithms developed by Microsoft and Dolby respecitively to produce a better-sounding audio file compared to a similarly-sized MP3 file.

Now with iTunes and Amazon on the scene and an increasing number of record companies offering access to MP3s of their albums when you purchase them on vinyl, we are seeing less importance in buying music on CD. I do still continue to buy most of my music on CD and rip it to the hard disk. I would use iTunes for purchasing music “as a single” or if it isn’t available on CD.

.. yet they can still be played on good sound systems like this one

.. yet they can still be played on good sound systems like this one

I retain my CD collection for a few reasons. For example, I could play CDs on hi-fi equipment which, in a lot of cases with the good stuff, sounds better than what I would be using for MP3 playback. Another reason that has come to mind with FLAC and similar high-grade audio files and high-grade network-capable audio equipment coming to the fore is the ability to “re-rip” the CDs to better-sounding FLAC using a media management program that works to this standard like dbPoweramp or Exact Audio Copy. Microsoft Windows 10 even offers the ability to rip CDs to FLAC as an “out-of-the-box” feature and I have taken advantage of this feature with newly-purchased CDs and some of the older discs.

Naim UnitiQute 2 on dressing table

“Re-ripping” to FLAC allows systems like the Naim UnitiQute 2 that handle high-quality file-based audio to perform at their best

I could then subsequently use the media manager to downconvert selected material to MP3, WMA or AAC for transfer to most portable equipment when taking it on the road or copy the music to a NAS with a DLNA media server that streams to the good equipment or downconverts and streams to equipment not capable of FLAC sound files.

Being able to keep using CDs as a music medium will still be important to me because of the ability to play them through good-quality equipment along with being able to reuse them as sources for high-quality file-based audio.

SanDisk releases a wireless NAS as a memory key

Article

SanDisk's memory key that is a wireless mobile NAS

SanDisk’s memory key that is a wireless mobile NAS

SanDisk Announces Bigger, Cheaper Wi-Fi Flash Drive | SmallNetBuilder

From the horse’s mouth

SanDisk

SanDisk Connect Wireless Stick

Press Release

Product Page

My Comments

There are a number of “wireless network-attached storage” devices on the market that are primarily pitched at people who use mobile devices and want to have network storage for these devices.

These devices typically work as their own Wi-Fi networks and work alongside a Web front that they provide or a native app provided by the vendor for the main mobile platforms to allow you to use them as networked storage for these devices. But those of you who use regular computers are typically required to connect these wireless NAS devices to the computer’s USB ports and use them as if they are removable storage devices.

SanDisk has released the the latest of these devices as the wireless networked equivalent of the USB memory key a.k.a. thumbdrive or jumpdrive. This device, known as the Connect Wireless Stick is the same size as a large USB memory key but has its own Wi-FI access point and Web server. There is an integrated battery and you can plug it in to a computer or USB charger to charge this device. In this same context, it can be used as a USB flash drive for the connected computer or multimedia device.

It also has the ability to work as a Wi-FI bridge for Internet connection through you setting up the Internet Connection in the SanDisk mobile app. But being a low-powered device, the SanDisk Connect Wireless Stick would have the ability to stream video content to three client devices concurrently rather than five for most of the hard-disk-based devices. Oh yeah, hang this around your neck to view content you have loaded on to it or share stuff with your buddies sitting at your lunch table in the caf – no need to forget it when you head to class.

But there are a lot of issues to be raised with these devices and how they interlink with the rest of the world. One of these involves the issue of manufacturers writing their own apps for their devices and requiring  users to install and use these apps to see full benefit from them. Here, the wireless NAS devices could use a common WebDAV or CIFS client and UPnP / Bonjour functionality for simplified discovery including the ability to discover the device’s Web page in that context. As well, the device could be managed through a password-protected Web page. This would allow for, at the most, one app to be deployed on your mobile device.

They would also have to support WebDAV and CIFS along with HTTP for two-way file transfer to and from hosts along with appropriate DLNA abilities for interaction with consumer-electronics devices. Similarly the wireless NAS devices would have to support working as clients or access points for small private networks i.e. home / small-business networks and as “go-between” bridges for public networks. This kind of functionality would require WPS and manual-entry setup for small private networks along with Wi-Fi Passpoint setup for public networks.

In essence, the wireless network-attached-storage device should be a point of innovation for everything that works with it. This includes public and private networks, consumer-electronics and photography devices along with system software for regular and mobile computing devices.

FIDO Alliance to encompass U2F authentication to Bluetooth and NFC setups

Articles

Samsung Galaxy Tab Active 8" business tablet press picture courtesy of Samsung

Bluetooth and NFC will allow keyfobs, cards and mobile devices to work as authentication devices for each other

FIDO Alliance adds authentication support for NFC and BLE | NFC World

From the horse’s mouth

FIDO Alliance

Press Release

My Comments

Soon it will be feasible for Bluetooth and NFC “touch-and-go” authentication to play a part in open-frame multiple-factor authentication thanks to FIDO Alliance. This is primarily to court those of us who are using mobile devices and want the same level of security as valued with regular computers.

The main goal of the FIDO Alliance was to get the USB transport interface working properly but then to have it work across other transports like Bluetooth and NFC? This is due to most mobile devices including an increasing number of laptops and “2-in-1” computers, coming with Bluetooth including Low-Energy (Bluetooth Smart Ready) and NFC functionality along with Android and Windows exploiting NFC functionality fully at the operating system level.

Example applications made feasible with Bluetooth and NFC in the second-factor authentication sphere include:

  • use of a “touch-and-go” card or a Bluetooth keyfob as your second factor for authenticating to a service from your regular computer or your mobile device – the device doesn’t need a standard USB socket
  • a smartphone that uses a software “second-factor” authentication program like Authy could transmit the second-factor code to your regular computer or tablet by Bluetooth or NFC “touch-and-go”.

As well, the fact that smartphones have a hardware (SIM-based) or software secure element means that they can become as much a strong partner in your data-security arsenal. The concept is also being extended to the idea of devices like smart locks and cars having the Bluetooth and / or NFC abilities along with an onboard secure element of some form.

Similarly the U2F and UAF specifications could earn their keep as a transport for other dedicated-purpose devices like smart locks which typically are implementing Bluetooth Low Energy and/or NFC technology as part of their presence in the Internet Of Everything. This can open up paths of innovation for integrating such devices in a personal-security web of trust.

Hyperoptic offers month-by-month Gigabit Internet service in the UK

Article

Hyperoptic to offer fibre-optic Internet service to UK's apartment buildings month-by-month

Hyperoptic to offer fibre-optic Internet service to UK’s apartment buildings month-by-month

Hyperoptic’s month-by-month Gigabit fibre-optic service

No contract Gigabit launched by Hyperoptic | ThinkBroadband

ISP Hyperoptic Add No Contract Option to 1Gbps FTTP Home Broadband | ISPreview UK

Advertising a month-by-month telecommunications service as “no contract” service

ASA UK Rules it Safe to Advertise Monthly Contracts as “No Contract” | ISPReview UK

From the horse’s mouth

Hyperoptic

Press Release

Advertising Standards Authority

Published Ruling concering Sky UK and their NOW TV service (month-by-month offering as a “no contract” service)

My Comments

Most Internet services, whether ADSL or next-generation broadband, are offered to customers on a contract where they have to maintain the service for 12 months or more. This is typically to benefit from cheaper or complementary equipment or tariff plans with better value. This may not suit every user, especially if you are on a short-term work placement or are living “month by month”.

Hyperoptic, who provide fibre-optic broadband to apartment blocks through the UK, have answered this need through the provision of a “month-by-month” plan for their next-generation broadband services. They understand that, as I have said before, a person may occupy an apartment for a few months rather than for the full 12 months or more.

The plans require you to stump up GBP£40 to get the service put on, which includes the provision of a Gigabit router. They offer a double-play Internet and telephone service for GBP£27 for a 20Mb service, GBP£41 for a 100Mb service and GBP£67 for a Gigabit service. These include the phone line rental and evening and weekend calls to UK landlines. There is also an “Anytime UK” plan and an “International” plan available but I am not sure of the prices for these plans. A pure-play broadband-only service will come for GBP£24 for 20Mb service, GBP£38 for a 100Mb service and GBP£64 for a Gigabit service.

The open question concerning these tariffs is whether you can take the Gigabit router with you when you move out of the apartment or leave it in place for the next tenant to use. As well, is there a cheaper “wires-only” or “self-install” connection-cost option for those of us who have suitable fibre-optic modem equipment and infrastructure in place? This could be feasible because of the fact that you don’t need to send people to the premises where existing infrastructure is in place and working.

I am surprised that Hyperoptic aren’t running a triple-play service of their own but it would be dependent on them tying up deals with an IPTV service that is operating in the UK like Sky or BT.

By the way, a question that the UK computing and IT press and blogosphere have raised about telecommunications, Internet, Pay TV or similar services is whether a service offered on a “month-by-month” basis with no long-term contract requirement should be described as a “no-contract” service? The advantage with these services is the fact that a customer can walk out of the service before the next monthly billing cycle by cancelling the service and settling up the account for the cost of the service. The IT press were splitting hairs by describing a single monthly billing cycle as a one-month contract because you wouldn’t be able to get money back for unused days of your service if you walked out before the end of the billing cycle.

The UK’s Advertising Standards Authority settled this once and for all by allowing a service provider to call a “month-by-month” service with no long-term requirement a “no-contract” service when they advertise it to the public. This is even though a contract that represents the monthly billing cycle of these services is technically a contract.

At least someone has stood up to the realities associated with apartment blocks and offered an Internet service deal that caters to people who come in an out of town on a short-term basis.

Telephone Interview–UPnP Forum (Wouter van der Beek)

Introduction

UPnP Forum logo courtesy of UPnP ForumI have had the chance to interview Wouter van der Beek who is the Vice President of the UPnP Forum which defines the standards and specifications associated with UPnP technology. This interview is primarily about the direction that the UPnP Forum and this technology is heading in the face of current personal-computing trends like cloud computing and the Internet Of Things.

What is UPnP

This is a collection of standard for interlinking network-connected devices at an application level. It is to facilitate discovery of the devices by other devices on that network along with the ability to benefit from what the device has. The idea had been seeded 15 years ago when the home network was becoming commonplace thanks to affordable but powerful computers along with affordable broadband Internet services, but there needed to be foolproof ways to allow most people to set up, manage and benefit from these networks without requiring extensive computer skills.

Freebox Révolution - courtesy Iliad.fr

Freebox Révolution – an example of equipment designed with UPnP in mind

This has been facilitated initially with the Internet Gateway Device which has simplified management of Internet access for devices on a home network. If you use a UPnP-capable router and have its UPnP IGD function enabled, you don’t have to meddle around with different settings to get an online game or Skype to work via the Internet.

DLNA collections listed as sources on the TV

DLNA content collections listed as sources on a Samsung Smart TV

It has also been facilitated with DLNA-capable media devices which use the UPnP AV MediaServer or MediaRenderer device control protocols. This is where you could use a smart TV or a Blu-Ray player to discover photos or vides kept on your computer or network-attached storage device or “push” music from a Windows computer, NAS or Android smartphone to a Wi-Fi-enabled wireless speaker. Here, it has become to that point where UPnP and DLNA have become so synonymous as an expectation for anything that uses the home network to provide or play / show multimedia content in a similar way that Dolby noise reduction was an expected feature for good-quality cassette players.

The foolproof way of setting up and using UPnP-capable network equipment has, for that matter, had me look for devices that support these specifications when I am involved in buying or specifying network equipment.

New Directions for UPnP

UPnP’s New Zones of Relevance

Previously, the Universal Plug And Play technology was confined to the home network which encompassed computers and related devices that existed in one’s home and connected to a router which served as the network’s Internet “edge”.

Thanks to trends like the highly-mobile devices like smartphones, tablets and laptops; the online services and cloud computing, and the increasing role of social media in our lives;  the UPnP technology and, to some extent, the home network has changed its zone of relevance. This encompasses the following zones of relevance:

  • Personal, which would encompass the devices we take with us or have on ourselves like smartphones, tablets, smartwatches and fitness bands
  • Home, which would encompass what we have at home such as computers, routers, NAS units, home AV, appliances and the like, even encompassing devices associated with comfort, energy management and security
  • Car, which encompasses the technology associated or integrated in our vehicles like infotainment systems or powertrain-management systems
  • Workplace / Business which encompasses the computing and communications technologies used in the office and would also encompass devices associated with comfort, energy management and security
  • Industry which would encompass systems that provide the backbone for the modern life.

It also encompasses the Internet Of Things where devices can be required to be sensors or actuators for other devices and services in a universal manner.

An example of this was to establish some Device Control Protocols like the Telephony DCPs with a view to look towards the many zones of relevance and increase the UPnP ecosystem’s relevance to more users.

Cloud and Remote Access now part of UPnP

One major change is to integrate cloud computing, remote access and online services in to the UPnP ecosystem. Previously, a UPnP ecosystem was encompassing just one network, typically your home network and required each endpoint to be on the same network.

Different zones of relevance

UPnP is now about online services and remote access

Now situations have risen such as the desire to gain access to your content held at your home from your friend’s home or a hotel, or exhibit pictures held on Facebook or Dropbox on our smart TVs at home. Similarly, even in the same home, not all devices are connected to the same home network such as portable devices drifting in to Wi-Fi “dark spots” where there is very little reception or devices that are connected to a “guest network” on our routers.

Now cloud and remote access were written on as an annex to the UPnP Device Architecture but support for this is a requirement for UPnP+ certification. This is to factor in the ability for a UPnP “realm” to transcend across multiple logical networks.

One of the key additions was to integrate XMPP in to UPnP as part of the Cloud initiative in order to provide a level open playing field for cloud-driven applications. This also will provide for secure transport of the necessary data. It is more centred around the concept of creating virtual rooms which UPnP devices and services are invited in to as needed with these rooms being part of different logical networks or IP subnets.

Making UPnP “safe for business”

Empire State Building picture courtesy of <a href="http://ny-pictures.com/nyc/photo/photographer/604482/araswami">araswami</a> and <a href="http://ny-pictures.com/nyc/photo/">New York Pictures</a

UPnP – to be safe for business

You may also wonder whether there are steps to make UPnP technologies “safe for business”? There are some steps that have taken place to assure this goal because the different zones of relevance like workplace / business and industry place a key emphasis on security.

One of these is the DeviceProtection DCP which allows the creation of a “network of trust” amongst UPnP Devices and Control Points. This will be mandatory as part of UPnP+ certification whereas it was simply an optional feature for UPnP networks. Other DCPs that will become mandatory for UPnP+ certification include the “management” DCPs: DeviceManagement, ConfigurationManagement and SoftwareManagement which look after how a device is set up and updated.

Of course, these are considered “retrofit” solutions which assure secure links and setups and any security concept is primarily about “buying time” from hackers.

As well, DLNA had integrated various content-protection measures in to the VIDIPATH specification which encompasses UPnP AV standards to assure secure content delivery for premium content like Hollywood films and big-league sports.

The Internet Of Things

Rethinking Device Control Protocols

Previously the UPnP Forum placed emphasis on the Device Control Protocol as being the way to describe a UPnP device and what it can do. This ended up with each of these protocols taking a long time to develop, whether at the initial stages or as they were being revised.

Examples of these were the UPnP Internet Gateway Device which described what a modem or router was about and this was shaped by telcos and network-equipment vendors; and the AV Device which described media storage, playback and control with this being shaped by most of the main consumer-electronics names.

As well as the long time it took to develop a Device Control Protocol, there was the risk of focusing these protocols on an application-specific vertical plane with functionality being duplicated amongst multiple protocols.

The new direction was enshrined in the “Internet Of Things Management And Control” DCP which is focused around the particular tasks a sensor or actuator device can do. This also enshrines language and data models that can be used to define applications. But it allows a sensor or actuator which does the same thing to be described the same way.

There were two examples we talked of: – a temperature sensor, and a lamp used as part a home automation or building automation setup. A temperature sensor measures temperature but it could be part of a room thermostat, a weather station or a fridge, but it does the same job by measuring and reporting the current temperature. A lamp is turned on and off or has its brightness increased or decreased but this could work as part of a “smart home” setup or as part of a building automation setup for an office building or an apartment block.

As well, the data models can be evolved for particular applications and there is a short turnaround time required to set a data model in stone. This could allow one to define an application-level device class based on a collection of sensors and the kind of measurements to be used.

Network Bridges

Another reality that UPnP would face is devices based on other standards. This encompasses sensor and similar devices that work on networks like Zigbee, Z-Wave and Bluetooth that don’t work on an IP/Ethernet-based structure or Ethernet-based technology that doesn’t implement IP as a way to liaise with devices at higher levels. In a lot of cases, these networks have come about due to an expectation that battery-operated sensor and similar devices are expected to run for six months or more on a single set of commodity “dry-cell” batteries like AA-size Duracells or CR2035 “button-size” batteries.

The UPnP Internet Of Things effort also includes Device Control Protocols to address Network Bridges so they can work in a UPnP or UPnP+ ecosystem. This should solve a very common problem with “smart-home” devices typically smart locks and central-heating controls, where Internet-connectivity bridges for these devices are supplied by the manufacturer and are designed to work only with that manufacturer’s devices.

Achieving vendor universality

The UPnP Forum has made big strides in achieving vendor universality but it still relied on the use of logo programs like DLNA or Designed For Windows or potential buyers pouring through specifications to achieve this goal when buying or specifying devices. But some competing ecosystems typically required one physical device such as a wireless speaker to have physical and logical support for each of them, thus the row of logos that adorn the top edge of a device.

But they would like to use concepts like Network Bridges to provide support across different logical ecosystems and have UPnP as a “glue” between the ecosystems.

Conclusion

By stripping the UPnP platform to functions that are on an elementary level, it means that the ecosystem can be evolved to newer requirements that work across any computing zone-of-relevance independent of where the data source or destination is.

At last an Ethernet adaptor for the Chromecast

Articles

HomePlug AV adaptor

The HomePlug powerline adaptor can now work with your Chromecast courtesy of the new Ethernet adaptor

Google adapter puts your Chromecast on wired networks | Engadget

Google Releases A $15 Ethernet Adapter For Chromecast [Update: Out Of Stock] | Android Police

Chromecast gains wired Ethernet dongle | The Register

From the horse’s mouth

Google Chromecast

Ethernet Adaptor Product Page (Order Here)

My Comments

Out of the box, the Google Chromecast connects to your home network via its integrated 2.4GHz Wi-Fi circuitry. But what use is this if the TV you are using it with is in a lounge area furthest away from your home network’s router. And the situation is made worse because you are dealing with a double-brick wall between what was the existing house and the newly-built extension. This is while the TV’s circuitry and chassis materials effectively attenuate the radio signals coming from the front. You end up with heaps of buffering because the Wi-Fi wireless signal is very poor.

You might try a cheap wireless range extender but find that you are taking it back to the store because it isn’t really effective and is a lot more difficult to deal with.

But Google has answered your need by providing an adaptor accessory that effectively gives it an Ethernet port which opens up some paths to improve the situation. This means that you could take advantage of the Ethernet infrastructure if you wired your house for Ethernet, or could use a HomePlug AV500 or HomePlug AV2 powerline-network kit to effectively provide a wired link between your home network’s router and the Chromecast-enabled TV. Even using a wireless-Ethernet client bridge that is positioned for best reception or supporting newer Wi-Fi technologies can work wonders with this device.

This adaptor is effectively a power supply for the Chromecast along with a USB-connected Ethernet network adaptor and connects to the Chromecast dongle via its microUSB port.  As far as I know, the installation involved for this device would simply be a “plug-and-play” affair.  But, if you are using HomePlug powerline networking, I would recommend a HomePlug adaptor with integrated power outlet to save on power outlets or a HomePlug adaptor with integrated Ethernet switch so you can allow the PS3 or Blu-Ray player to take advantage of the same wired backbone.

It didn’t take long for Google to sell out of this device in the USA so if the link says “out of stock”, check back later. This could mean that they would have to ramp up the number of units being built and reckon that it is tome to release it in to other markets.

As well, anyone who is designing a network media receiver of the kind that directly plugs in to a TV’s HDMI socket and connects via Wi-Fi wireless could make sure there is a way to connect an Ethernet adaptor to these devices and such an adaptor is available.

Why do you need to safely remove or eject removeable media?

USB memory key

USB storage device

As you use a computer, you will have to get in to the habit of removing or ejecting external or removeable media safely and in a proper way rather than just unplugging the device or pulling out the card.

What is this about safely removing or ejecting removeable storage?

Mainframe and similar large computer setups required the operating system to logically mount a tape or disk pack after the system operator installed the medium in the appropriate drive. This procedure makes the files on the medium available to the operating system and computer programs

USB external hard disk

USB hard disks are more critical with this procedure

Then when the medium was finished with, the system operator had to logically unmount the disk or tape which forced all files to he written back to the medium and the operating system to deem the files on the medium to be unavailable. This procedure was also simplified when the tape and disk-pack drives used electromechanical readiness detection like sensing when a lid or door was closed or a tape was past the heads to let the host computer know that they had media on board and were ready to work with it. It would then require the operator to logically mount the medium and make it available to the system’s programs, typically by typing a special “mount” command.

Desktop operating systems like MS-DOS did away with this to simplify the operating procedures for most people especially as they were used just by one user compared to the previous mainframe systems that were used by multiple concurrent users. It also allowed the use of low-cost disk and tape systems on these computers.

Here, these operating systems immediately wrote back all file changes to the disk when a file was created, modified or deleted. As well, if a program was after a file, it would perform a directory search to determine if the file was there on that disk and the operating system didn’t cache the removeable medium’s directory structure in to the host’s memory. In a lot of cases, the act of closing the disk drive’s door or inserting a 3.5” floppy disk cause the operating system to start reading the disk’s directory in to memory.

But the Apple Macintosh maintained a similar operating requirement to the larger computer systems where you had to logically remove a floppy disk or CD from the system typically by dragging the disk’s icon to the Trash before the computer ejected the disk. This was facilitated with these computers having floppy drives that implemented electromechanical load-eject mechanisms and no hardware “eject” button ever since the platform was created.

This was carried through with Zip drives and other similar removeable-media drives that used any form of electromechanical load-eject mechanisms. The presence of an eject button on these drives typically worked as a way of telling the operating system about an intent to remove the medium so it is logically unmounted and was also implemented with newer iterations of the MS-DOS / Windows operating system along with driver programs for earlier iterations of that operating system.

Similarly, those of you who have used the MiniDisc format, especially with an MD deck or a music system that has an integrated MD recorder, may notice this taking place when you are recording to these discs. What will happen with these decks is that a message will flash up on the unit’s display screen that it is writing all the changes to the disk when you press the eject button or power off the unit before the disk is available or the unit switches off. This makes sure that all of the recording and editing activity is properly committed to the disk and is intact.

Why was there a need to tell the operating system that you were intending to remove the medium

If removeable media is removed by surprise, there can be problems with the quality of the data that is written to the medium because the operating system and applications think that certain files on the medium are available to be worked with.

This can lead to corrupted files because all the changes to the file being worked on haven’t been written to the medium completely. There are also issues with the files being locked by programs that are writing back the necessary changes so that other programs can’t interfere with this process, and if a program hasn’t released these locks or committed all of the changes, the files may not be available for other programs to work with. In the worst cases, your computer can go in to a headspin if it is working with a file that exists one minute and doesn’t exist the next.

How do you safely remove USB removeable media?

Windows Explorer (File Explorer) eject option

Eject option in Windows Explorer

With a computer, you make sure that you have closed the files you are working on if you were using a program to work with them. Then you perform a safe-removal procedure that is dependent on your operating system.

Macintosh users simply drag the icon representing the removeable storage to the Trash icon at the bottom right of the Desktop screen. Then there will be a message to say that it is safe to remove the medium.

Windows users can do this in two ways. They can open Windows Explorer (File Explorer) or My Computer and right-click on the removeable storage which will be represented as its own drive letter. They then select the “Eject” option to begin safely removing the storage device.

Safely Remove Hardware icon in Notification area

Safely Remove Hardware icon in Notification area

The other method requires you to click on the Notification Area on the Taskbar and right-click on the “Safely Remove Hardware And Eject Media” icon. Here, you are presented with a list of USB storage devices that are connected to your computer. Click on the one you want to remove to begin safely removing it. In some cases, a physical device may represent two or more logical volumes (drive letters) because it has been partitioned as such. Here, you select the physical device’s name to safely remove that device.

Safely Remove Hardware devices list

Devices available to remove

USB-based removeable-media adaptors like floppy-disk drives, Zip drives and memory-card readers have the ability to safely remove a particular medium or the whole device. Here, you can click on the medium to remove the card or disk or click on the physical device name to remove the device before you unplug it.

Safely remove hardware devices list

Two logical devices in one physical device – the one that is written clearly is the one to remove

This is more important with those devices that handle multiple media types like some multi-slot memory-card readers or devices that have a combination of fixed and removeable storage options like some digital cameras and camcorders that have internal storage along with an SD or microSD card slot. In the latter situation, these devices would have fixed storage greyed out while the removeable storage is written in black.

I have prepared a PDF reference sheet about the procedure needed to safely remove your removeable media from your Windows computer. Download and print this and keep it by your computer if you or others need to know how to do this properly.

Android users would go to the Storage menu and select the “Unmount SD Card” option for the SD card or “Unmount Mass Storage” for storage devices connected to their mobile devices via USB “On The Go” connectivity.

Safe to remove notification

It is safe to remove

For other devices like A/V devices that write to an SD card or USB memory key, you would have to go to the device’s menu and select the “Unmount”, “Remove” or, more likely, “Eject” option. This process would be analogous to ejecting a tape, CD or MiniDisc so you can work with another medium.

Of course, powering off the equipment properly such as selecting a logical shutdown option would prepare any media or removeable devices attached to the equipment for safe removal.

Conclusion

Once you know how to properly and safely remove media or detach USB storage devices from your computer or similar device, you can avoid situations which can place your computer’s reliability or the data on that medium at risk.

Bluetooth beacons find an application in point-to-point racing

Article

VW Golf 3rd Generation rally car in Saxony rally by André Karwath aka Aka (Own work) [CC BY-SA 2.5 (http://creativecommons.org/licenses/by-sa/2.5)], via Wikimedia Commons

Bluetooth beacon technology is relevant with rally racing and similar sports

Hill climb cars to include beacons | NFC World

From the horse’s mouth

Pikes Peak International Hill Climb

Press Release

My Comments

This year’s Pikes Peak International Hill Climb in Coloradio Springs, Colorado, USA has become an interesting race when it comes to enriching the spectator’s experience.

It has been facilitated by the use of Bluetooth Beacons or iBeacons along with an iOS 8+ iPhone app which provides detailed up-to-date information about the competitors and where the place during the race. This includes the ability for users to favourite a competitor and be notified when they hit the finish. The Bluetooth Beacon technology is pitched as being Internet-independent because there isn’t the need to have the vehicles equipped with GPS-capable devices and spectators’ smartphones can pick up these beacon signals easily.

Tour De France in London - Flickr Creative Commons image by John Pennell

.. like bike races of the Tour De France calibre

But I do see more potential for this in rallies, hill-climb races, road-based cycle races, marathons and similar point-to-point races. This is where competitors are required to race from one point to another and following a known route or series of waypoints. Here, spectators would typically be spread across the (typically long) course and would want to know when their favoured competitors are coming past them as well as knowing how they are placed in the competition.

The same technology can work with other computer systems to accurately determine who has won the race without requiring the use of proprietary transponder technology. As well, there isn’t a requirement for competitors to carry and use GPS devices that need continual mobile-broadband links for uploading real-time position data, something that would be difficult with events held in country areas where such service isn’t all that reliable. The other bonus is that the Bluetooth beacons are very lightweight which adds very little weight to the competitor or competing vehicle where any extra weight carried can slow the competitor down.

But the hillclimb allowed spectators with suitably-equipped mobile devices that supported beacon detection to detect these beacons themselves when it comes to when “their” competitors are near. As well, computing devices with Bluetooth Smart functionality and Wi-Fi / mobile-broadband Internet access can be located at key points in the course to report the competitors’ positions for real-time updates for broadcast and online use.

It does show that the idea of using the Bluetooth Beacon technology for tracking the competition in point-to-point races has been proven thus allowing for systems that are more affordable for providing real-time competition updates for the spectators. It could be that as you watch that car rally you could have you phone notify you when that rally legend is near and about to perform that 3-point turn in the WRX. Similarly, your phone would notify you as the Tour De France péléton is about to arrive in your street so you can flip open those shutters and windows on the front of your house to have a look as it comes past.

For it to work effectively, the Bluetooth Beacon technology needs to be able to work on the client side with iOS, Android and Windows platforms with the necessary client apps written to work on each of those platforms.

A French community shows that impending next-generation broadband service can improve ADSL service

Article – French language / Langue Française Brittany flag

Montée en débit en ADSL dans la commune de Sibiril en Bretagne | DegroupNews

My Comments

In a lot of rural and peri-urban areas, even ADSL internet service can be substandard as I have witnessed a few times. This is typically aggravated by established telecommunications entities that underinvest in the infrastructure that serves these areas and this infrastructure is not conducive to proper performance for any service based on DSL technologies.

In Brittany, France, the community in Sibril have decided to take action to have their telephony infrastructure improved before the arrival of an impending fibre-based next-generation broadband service. This effort has paid off with the bandwidth for 259 households in  the territory being improved to nearly 20Mbps where it was in the order of 0.5Mbps to 2Mbps. It has made the service fit for IP-based video services  to Full HD specification along with quicker downloading for even large files.

What Orange have done is to install cabinets closer to the affected locations and run fibre-optic cable to these cabinets, in a similar vein to a fibre-to-the-cabinet setup which implements VDSL2 technology. But they have deployed ADSL2 DSLAMs in the cabinets to assure continuity of ADSL2 service with existing Liveboxes. As well, the customers’ telephone cables are routed to the communications cabinet rather than the main telephone exchange.

This technique comes in to its own with country areas that have a village, hamlet or town which services a collection of smaller communities, something that is taking place in a lot of rural areas. It also comes in to its own with country towns that are growing and the telephony infrastructure needs to be re-worked. Here, a telecommunications cabinet could be installed closer to the various communities and it houses DSLAMs and similar “on-ramp” equipment but has enough rackspace to cope with a few large-property subdivisions that increases the number of customers. Then this cabinet is linked back to the main exchange using a fibre-optic connection while the premises’ telephony and ADSL services are terminated at the cabinet.

There is a greater chance of increased communications security for these areas because if there is equipment breakdown or power failure in a particular cabinet, other areas aren’t affected by the failure. This could also lead to the provision of battery backup in those cabinets for the local telephone services with this requiring a reduced energy need.

At least this comes across as a near-term solution to providing real broadband to densely-populated country areas or to cater for country areas that take a different more-dense housing character.

Questions being raised by French carriers about promoting FTTB fibre service

Article – French language / Langue Française)

Is the fibre-optic Internet service to the building or to the apartments?

Is the fibre-optic Internet service to the building or to the apartments?

“Vraie” fibre contre “fausse” fibre : le gouvernement veut clarifier les choses |ZDNet.fr

“Real” fibre versus “fake” fibre : Government wants to set things right

My Comments

An issue that will surface with deploying fibre-based next-generation Internet service to apartment and office blocks and shopping centres is how should the Internet service be properly qualified as far as the consumers are concerned.

In France, where a lot of households are based in apartments, there is a fair bit of bickering about whether a service provider had installed a fibre-to-the-premises or a fibre-to-the-building deployment.  This is especially where service providers are wanting to run that their fibre installation is “real” fibre rather than “false” fibre as part of one-upping themselves against the competition.

In a multi-occupancy development, a fibre-to-the-premises deployment has fibre-optic cabling going to each apartment, shop, office or other premises. This is compared to a fibre-to-the-basement development, also known as a fibre-to-the-building development where the fibre-optic cabling goes to the building’s telecoms closet and a copper-based cabling solution is used to bring the Internet service to each apartment or shop. The copper-based cabling solution could implement VDSL2 which uses the building’s existing telephone cabling, DOCSIS 3.1 which uses the coaxial cabling that is part of cable-TV infrastructure or Gigabit Ethernet with new Cat5 or Cat6 twisted-pair “blue” cabling.

Most consumer-driven deployments would focus on the fact that households primarily download stuff and would focus on the download speed. But there are users who place value on upload speed which is one of the advantages offered by fibre-to-the-premises. These would include people who frequently work from home or run a home-based business, along with the shops, offices and like premises used for business purposes. They would place importance on uploading so as to facilitate cloud computing, telecommunications, onilne-storage and similar business services. Similarly, the concept of a future-proof next-generation Internet deployment would be considered important as peoples’ needs evolve.

An all-fibre deployment along with a fibre-copper deployment that uses Cat5 or Cat6 Gigabit Ethernet cabling for its copper component would offer the synchronous download-upload capabilities and high speeds that business users would want.

But there needs to be a standard for qualifying whether a service provider or infrastructure provider  has wired that multi-occupancy building with a fibre-to-the-premises setup or a fibre-to-the-building setup. This would include what kind of technology the copper component was based on in the latter service type and whether it is feasible to upgrade to an all-fibre installation along with extra approximate costs.

As well, there would need to be requirements concerning the kind of marketing spiel that service providers or infrastructure providers deliver to those with executive authority over the buildings and the marketing spiel delivered to potential customers who occupy these buildings.

At least the French are fleshing out this issue so that there are proper requirements regarding the marketing of next-generation broadband to apartment dwellers and shopping-centre tenants.