Tag: device management

Sonos dumps the device-bricking Recycle Mode

Previous HomeNetworking01.info coverage Sonos multiroom system press picture courtesy of Sonos

The Sonos debacle has raised questions about our personal tech’s life cycle

My Comments

In January, Sonos introduced the “Recycle Mode” which effectively disabled your Sonos network-multiroom-audio device after a certain number of days. It was seen as a way to detach the device from your Sonos-based network-multiroom-audio setup and wipe all of your data out of the device when you relinquish it to an e-waste recycling facility.

It was part of them establishing an end-of-feature-support rule for their older devices made prior to 2015 due to newer faster processing silicon in the newer devices. That is where older devices will only receive software-quality updates and won’t benefit from any newer functionality that Sonos releases.

But there is a reality with this kind of equipment where it is effectively “pushed down” to secondary areas as a way to build out that Sonos audio setup. As well, people do give the equipment away to family, friends and community organisations they are a part of, or sell the equipment through the second-hand market where those of us “putting our foot in the Sonos door” may buy this equipment at a cheaper price.

The social-media users were concerned about the use of that “Recycle Mode” which disabled the Sonos equipment due to it not being available for giving away or selling to the second-hand market. Sonos have answered this issue by removing the “Recycle Mode” and requiring users who are done with a particular piece of Sonos equipment to perform a factory-reset procedure (Sonos instructions) on that unit.

It is a procedure you may do if the equipment is faulty and you want to bring it to a “known quantity” as part of troubleshooting it. But performing this procedure before you relinquish the equipment effectively detaches it from your Sonos account and multi-room audio system while removing any personal configuration data from it including parameters associated with your home network.

They still have to address the issue of a Sonos audio setup consisting of legacy and newer equipment and what happens when newer features come out. The problem still raised is the fact that older equipment would preclude modern equipment from receiving functionality updates. It is although a Sonos multiroom setup will benefit from software-quality updates even if it cannot receive functionality updates.

As well, they would need to address what happens when an online media service revises their software links that enable access to their service via consumer-electronics devices. Would a software update to accommodate this revision be considered a feature-update or a software-quality update whether the result is to provide the same functionality as before or accommodate the service’s new features?

What is being called out is how a high-value network-media device with an expectedly-long service life should he maintained through its service life. It includes how long should it be supported for and what should happen towards its end-of-support time.

Make VPN, VLAN and VoIP applications easy to set up in your network

Draytek Vigor 2860N VDSL2 business VPN-endpoint router press image courtesy of Draytek UK

Routers like the Draytek Vigor 2600N which support VPN endpoint and IP-PBX functionality could benefit from simplified configuration processes for these functions

Increasingly, the virtual private network, virtual local-area network and IP-based voice and video telephony setups are becoming more common as part of ordinary computing.

The VPN is being seen as a tool to protect our personal privacy or to avoid content-blocking regimes imposed by nations or other entities. Some people even use this as a way to gain access to video content available in other territories that wouldn’t be normally available in their home territory. But VPNs are also seen by business users and advanced computer users as a way to achieve a tie-line between two or more networks.

The VLAN is becoming of interest to householders as they sign up to multiple-play Internet services with at least TV, telephony and Internet service. Some of the telcos and ISPs are using the VLAN as a way to assure end-users of high quality-of-service for voice or video-based calls and TV content made available through these services.

AVM FRITZ!Box 3490 - Press photo courtesy AVM

… as could the AVM Fritz!Box routers with DECT base station functionality

It may also have some appeal with some multiple-premises developments as a tool to provide the premises occupiers access to development-wide network resources through the occupiers’ own networks. It will also appeal to public-access-network applications which share the same physical infrastructure as private networks such as FON-type community networks including what Telstra and BT are running.

VoIP and similar IP-based telecommunications technologies will become very common for home and small-business applications. This is driven by incumbent and competing telecommunications providers moving towards IP-based setups thanks to factors like IP-driven infrastructure or a very low cost-of-entry. It also includes the desire to integrate entryphone systems that are part of multi-premises buildings in to IP-based telecommunications setups including the voice-driven home assistants or IP-PBX business-telephony setups.

Amazon Echo on kitchen bench press photo courtesy of Amazon USA

A device like the Amazon Echo could be made in to a VoIP telephone through an easy-to-configure Alexa Skill

In the same context, an operating-system or other software developer may want to design a “softphone” for IP-based telephony in order to have it run on a common computing platform.

What is frustrating these technologies?

One key point that makes these technologies awkward to implement is the configuration interface associated with the various devices that benefit from these technologies like VPN endpoint routers or IP-based telephony equipment. The same situation also applies if you intend to implement the setup with multiple devices especially where different platforms or user interfaces are involved.

This kind of configuration also increases the chance of user error taking place during the process which then leads to the setup failing with the user wasting time on troubleshooting procedures to get it to work. It also makes the setup process very daunting for people who don’t have much in the way of IT skills.

For example, you have to complete many steps to enrol the typical VPN endpoint router with a consumer-facing privacy-focused VPN in order to assure network-wide access to these VPNs. This involves transcribing configuration details for one of these VPNs to the router’s Web-based management interface. The same thing also applies if you want to create a VPN-based data tie-line between networks installed at two different premises.

Similarly, IP-based telephony is very difficult to configure with customers opting for pre-configured IP telephone equipment. Then it frustrates the idea of allowing a customer to purchase equipment or software from different resellers thanks to the difficult configuration process. Even small businesses face this same difficult whether it is to add, move or remove extensions, create inter-premises tie-lines or add extra trunk lines to increase call capacity or provide “local-number” access.

This limits various forms of innovation in this space such as integrating a building’s entryphone system into one’s own telephone setup or allowing Skype, Facebook Messenger, WhatsApp or Viber to permit a business to have a virtual telephone link to their IP-telephony platforms.

It also limits the wide availability to consumers and small businesses of “open” network hardware that can answer these functions. This is more so with VPN-endpoint routers or routers that have IP-based telecommunications functionality which would benefit from this kind of simplified configuration process.

What can be done?

A core requirement to enable simplified provisioning of these technologies is to make use of an XML-based standard configuration file that contains all of the necessary configuration information.

It can be transferred through a download from a known URL link or a file that is uploaded from your computing device’s local file system. The latter approach can also apply to using removable storage to transfer the file between devices if they have an SD-card slot or USB port.

Where security is important or the application depends on encryption for its operation, the necessary binary public-key files and certificates could be in a standard form with the ability to have them available through a URL link or local file transfer. It also extends to using technologies based around these public keys to protect and authenticate the configuration data in transit or apply a digital signature or watermark on the configuration files to assert their provenance.

I would also see as being important that this XML-based configuration file approach work with polished provisioning interfaces. These graphically-rich user interfaces, typically associated with consumer-facing service providers, implement subscription and provisioning through the one workflow and are designed to he user-friendly. It also applies to achieving a “plug-and-play” onboarding routine for new devices where there is a requirement for very little user interaction during the configuration and provisioning phase.

This can be facilitated through the use of device-discovery and management protocols like UPnP or WSD with the ability to facilitate the upload of configuration files to the correct devices. Or it could allow the creation and storage of the necessary XML files on the user’s computer’s local storage for the user to upload to the devices they want to configure.

Another factor is to identify how a device should react under certain situations like a VPN endpoint router being configured for two or more VPNs that are expected to run concurrently. It also includes allowing a device to support special functions, something common in the IP-based telecommunications space where it is desirable to map particular buttons, keypad shortcodes or voice commands to dial particular numbers or activate particular functions like door-release or emergency hotline access.

Similarly, the use of “friendly” naming as part of the setup process for VLANs, VPNs and devices or lines in an IP-telephony system could make the setup and configuration easier. This is important when it comes to revising a configuration to suit newer needs or simply understanding the setup you are implementing.

Conclusion

Using XML-based standard provisioning files and common data-transfer procedures for setup of VLAN, VPN and IP-based-telecommunications setups can allow for a simplified setup and onboarding experience. It can also allow users to easily maintain their setups such as to bring new equipment on board or factor in changes to their service.

Windows to introduce quick-pair for Bluetooth

Articles

Dell Inspiron 13 7000 2-in-1 Intel 8th Generation CPU at QT Melbourne hotel

Quick pairing to come to Windows 10 to simplify connecting Bluetooth headsets to these computers

Bluetooth quick pairing feature in the works for Windows 10 | Windows Central

Bluetooth “Quick Pair” Feature is Coming to Windows 10 | Thurrott blog

Previous coverage on Bluetooth quick-pairing

Bluetooth Fast Pairing–to be part of the Android platform

My Comments

Google Fast Pair in action - press image courtesy of GoogleApple and Google have put up a simplified Bluetooth pair-up approach for commissioning newly-purchased Bluetooth headsets and other accessory devices with host devices based on their mobile operating systems.

This approach has the Bluetooth device sending out a short range “beacon” to compliant host devices, causing them to pop up a notification inviting the user to instigate the pair-up procedure. Google even had the ability to invite users to download and install any companion apps for devices designed with the “app-cessory” approach.

It is rather than having the user head to the Bluetooth menu on their host device and to make sure they choose the Bluetooth peripheral device they intend to pair to. This can be arduous where Bluetooth device names appear to be very confusing such as to only show a model number or the device is being set up in an area where other Bluetooth devices are being setup to be discoverable such as “always ready to pair” default setups like Alpine car stereos.

Now Microsoft is working on similar functionality that will appear in the next or subsequent feature release of Windows 10. In this case, Windows users will have the ability to enable or disable this feature and the notifications will appear as pop-up messages.

Plantronics BackBeat Pro Bluetooth noise-cancelling headphones

.. to make these easy to set up

The Windows 10 host computer would need to be equipped with a Bluetooth interface compliant to Bluetooth 4.0 Low Energy (Bluetooth Smart) standards for this function to work. It effectively makes the user experience for Bluetooth devices very similar to the “plug-and-play” experience that Microsoft achieved for peripherals directly connected to a Windows host computer.

Why would I suspect that a user be required to put a “fast-pair” Bluetooth device in setup mode?

One reason that I would see some manufacturers require a user to place a “fast-pair” Bluetooth peripheral device in a setup mode or specifically enable this feature on that device would be to conserve battery runtime on a portable device. Here, having a device broadcasting the beacon signal all the time may be taking power away from the device’s main functionality thus shortening the battery’s runtime.

It could also be a device security requirement to cater for environments where multiple compliant host devices are likely to exist and you want to make sure that your accessory device isn’t ending up pairing to someone else’s host device. It is an important issue with health and allied devices like fitness bands which work with your smartphone and these devices are dealing with very personal information. This can also be a user-experience issue regarding pop-up notificatiosn for other users’ devices.

What is showing up now is that a simplified user experience is being made available whenever you are commissioning a newer Bluetooth device.

iTunes downgrade to permit tethered iOS app deployment–Apple could do better here

Article

iTunes Store

iTunes losing its ability to install software to iOS devices from version 12.7 onwards

Apple Releases New iTunes 12.7, What You Should Know | AppleToolbox.com

My Comments

An issue that will face iOS device users who make use of the iTunes desktop media-management applications is that starting from iTunes 12.7 onwards, they won’t be able to upload iOS apps from their regular computer to their iOS mobile device in a tethered manner using this software. This is in addition to omitting the iOS App Store from the iTunes Store shopfront integrated in iTunes. It is also part of a direction that Apple is enforcing with iOS where you manage your iPhone or iPad from its screen and update its software “over the air”.

Apple iPad Pro 9.7 inch press picture courtesy of Apple

Apple could still provide desktop management of their iOS devices through separately downloadable software

Tethering is where you connect a computing device that can normally function alone to another computing device, typically a regular computer, by a wired connection. This is typically to allow a smartphone to be a modem for a regular computer or to transfer data stored on one device to the other device. In this case, it is to transfer iOS apps stored on your regular computer running macOS or Windows to your iPhone, iPad or iPod Touch that you have connected to the computer.

But there are people who use a Mac or Windows regular computer to deploy iOS software to iPhones and iPads. For example, in your business or household, you may want to deploy the same app to multiple iOS devices and want to save bandwidth by caching the app to your regular computer’s hard disk then deploying the same app by tethering each iOS device to your regular computer. As well, some of us may use this as a way to get around a dodgy Internet connection by downloading to a laptop used at a location with known-to-be-good Internet service then deploying where it’s more convenient.

Apple offered a make-do update for iTunes by offering the iTunes 12.6.3 software. This has the feature set associated with iTunes 12.6 including access to the iOS App Store and tethered app deployment for iOS devices. But it has under-hood improvements which allow it to work with iOS devices that are running iOS 11 or newer versions. This is alongside iTunes 12.7 which is focused as a media-management tool and iTunes media storefront.

Personally, I would like to see Apple approach this situation in a better manner for both the Mac OS and Windows operating systems. This would be in the form of a separately-installable “iOS-desktop-manager” program that provides add-on functionality to either the Mac OS operating system for Macintosh computers or to the iTunes Windows port. It would at least provide desktop access to the iOS App Store along with tethered app deployment for iOS devices.

As well, the “iOS-desktop-manager” program could provide device backup and management abilities so you could do things like backup an iPhone or reset a faltering iPod Touch. This is more so where the Wi-Fi or wireless-broadband modem in an iOS device or its network connection can be a point of failure and it isn’t realistic to restore from an iCloud backup if the iOS device’s Wi-Fi is so slow or intermittent.  Similarly, using something like your local backup infrastructure such as your NAS or a USB external hard disk of your own means that you aren’t necessarily ceding control of your mobile-created data to others, something that can be of importance when it comes to privacy.