Tag: Google

You can start and stop Google Chromecast with your TV’s remote

Articles

You Can Now Control Your Chromecast With A Normal TV Remote | Gizmodo

Chromecast now works with your TV’s remote control | Medium

You Can Now Play Or Pause Chromecast Videos With Your TV’s Remote | Lifehacker

My Comments

This can now control your Chromecast

This can now control your Chromecast

The $49 Google Chromecast dongle is able to stream from your smartphone, tablet or computer to your HDMI-equipped TV or projector via your Wi-Fi-equipped home network.

The HDMI specification includes HDMI-CEC (Consumer Electronics Control) functionality, typically presented by equipment manufacturers under their own marketing names like Anynet+, VIERA Link, BRAVIA Link and REGZA Link. Here, this allows for “one-touch start” where a Blu-Ray player or similar device wakes up the TV and, where applicable, home-theatre amplifier, and selects the input it is connected to while the source device prepares to play. Similarly, it allows for “one remote control” operation of multiple video devices such as to use your TV’s remote control to navigate the menus on a DVD that is in a separate Blu-Ray player that is connected to the TV, another way to simplify how your AV setup is operated.

The Google Chromecast had a basic level of HDMI-CEC functionality where it can wake up your HDMI-CEC-capable TV and amplifier and select the input it is connected to if you start streaming through the Chromecast with your phone or computer. This reduced the confusion associated with operating it somewhat.

But, thanks to a new firmware update, you can start and stop your Chromecast content using the play and pause buttons on your TV’s remote control. This includes the ability to pause content using the TV’s remote control and resume it with the device you are streaming it from or vice versa. This can come in handy where you just want to use the device nearest to you to pause it or get it going quickly.

Google could see more potential with HDMI-CEC and the Chromecast. For eample, they could exploit the remote control’s D-Pad as a way of navigating onscreen menus or “paging through” photos in a collection for example. It could also give the likes of Apple something to worry about as HDMI-CEC becomes a desireable feature for platform-based set-top devices.

Google’s Project ARA phone being trialled in Puerto Rico

Article

Project Ara Hands-on: Meet Google’s Future-Proof Phone | Tom’s Guide

Concept Video

http://youtu.be/T6BHJspyh6s

My Comments

I have made some mention about Google’s Project Ara modular smartphone which uses “swap-out” modules so you can customise it to your needs and tastes effectively.

The Project Ara platform, as I have said before, reminds me of the IBM PC family of desktop computers and other desktop computers built on the AT, ATX and similar platforms where you can easily install cards to add functionality to them or improve their functionality. This is something I have done so many times where I have moved hard disks, optical drives, video and sound cards and the like between different computers to gradually upgrade to the computer that I wanted.

But there has been a lot of mockup prototypes and proof-of-concept models being shown by Google to the press at various times. Now the rubber hits the road at Puerto Rico where they are doing an area-specific “market-test” on this concept using food trucks as a way to sell the phone and modules.

It has become a chance for the computer press to see some actual working examples in use where the device works as a mobile device – as in to see it work.

I do see the Google Ara platform become a way for other device manufacturers to implement ways to expand their devices to suit today’s needs. The key application that would come to mind would be Project Ara network or interface modules like Wi-Fi, Bluetooth or Zigbee modules installed in the “durable” class of devices like heating / air-conditioning systems or “white goods” to be part of the connected home; similar modules installed in Smart TVs to allow them to run newer firmware.

Google Chrome can now detect loaded downloads

Article

Chrome update to raise alarms over deceptive download bundles | The Register

From the horse’s mouth

Google

That’s not the download you’re looking for …. – Blog post

My Comments

I have helped a few people out with removing browser toolbars and other software from their computers that they didn’t necessarily invite in the first place. What typically happens is that a person looks for software to do a particular task such as a lightweight game, native front-end for an online service, video-codec pack, an “essential” CD-burning tool or an open-source Web browser, but they work through a very confusing install procedure that has them invite software like TubeDimmer to their computers if they aren’t careful.

A lot of this unwanted software ruins the browsing experience by “cluttering” the screen with extra advertisements and data or redirects genuine links to advertising sites hawking questionable products. As well, they are more likely to “bog” the computer down by stealing processor time and RAM memory space.

Mozilla has become aware of the problem with Firefox courtesy of their bug-reporting mechanism and found that it wasn’t about proper software bugs but improper bundling practices. They had found that these bundles were infringing their copyrights and trademarks that they had with the software, especially the open-source concept.

Google has answered this problem at the search phase of the operation by identifying whether a download site is paying to advertise courtesy of its Adwords keyword-driven advertising service and provided a way to highlight that the software is not the official software site. This is typically because a download site may bundle multiple programs in to the install package rather than just having the program you are after.

They are even going to “expose” the detection software to Mozilla and others to allow them to integrate the detection functionality in their “regular-computer” browsers or desktop-security software by virtue of their Safe Browsing application-programming interface.

This may be a step in the right direction towards dealing with “loaded downloads” but desktop security programs could work further by identifying installation packages that have more than what is bargained for.

Google to get their fibre claws in to the UK

Article

Google Considers Bringing Google Fiber to UK | Broadband News and DSL Reports

Google aimed to build ultrafast broadband in Britain | The Telegraph (UK)

My Comments

Google are putting their fibre-optic next-generation broadband paws in to the UK market while trying to provide competitive Internet service in some US communities. It is seen to be their first foray in to the European market.

This is being achieved with them working with CityFibre, which may not be seen as adding extra competition in that market. Firstly, this is to be seen as a threat to BSkyB’s partnership and place themselves at loggerheads with a BSkyB / TalkTalk fibre-optic rollout which is passing 20,000 households in York.

But it is set to put more pressure on BT to deploy more next-generation broadband, especially as the British Internet press is complaining about BT Openreach taking a long time to roll out this service across the biggest Internet-service market outside the US. Google will also see this as a platform to run an HD-capable IPTV service which is ready for 4K UHDTV.

My question is whether Google could make further efforts in working as a competitive next-generation broadband provider for the British market, whether as a wholesale provider or as a retail provider. As well, could they be in a position to help with Scotland’s broadband goal if Scotland does go independent? Similarly, could they be able to put their claws in to other European areas like Spain, Germany and Italy with a goal to upset the applecart when it comes to competitive Internet service there.

Google to use the Chrome platform to build a TV-hosted photowall

Article

Turn Your TV Into An Interactive Scrapbook With Chrome Photowall | Fast Company

My Comments

Media contents in Dropbox folder available on DLNA-capable Samsung smart TV

With Google Chromecast, a smart TV could become a photowall

A friend of mine who likes “scrapbook walls” as part of parties or as a way to represent their children growing up. She typically used A0 or A1 sheets of card to either glue cutouts of photos or even pinned one of these sheets up on a wall during her 21st so people can leave messages wishing her happy 21st birthday.

Google has taken this further by making the TV screen become a photowall using a Chromecast “server” app alongside client apps for iOS and Android mobile platforms and a Web page that is part of the server platform.

Here, guests can upload messages and photos on to this photowall from their mobile devices or the Web page and they appear on the TV screen associated with the Chromecast device.. There is the ability to have “tiling up” occur for the photowall with pictures come in at different sizes.

According to the article, this software is not a polished product. But I see it appeal to other software platforms such as the “smart-TV” / connected-video-peripheral app platforms or just simply the “regular-computer” platforms (Windows and MacOS X) for display functionality. It could also work well with support for user-nominated “image pools” like NAS directories, DLNA content pools, Social-Web albums or “cloud-storage” folders.

Similarly, it could support the concept of a single “content-and-control” server which could control how pictures appear on multiple screens. This could appeal to setups where you could run multiple photowalls such as during a large party.

The Google Photowall concept could be all about realising the fact that multiple pictures can be displayed at the same time in a manner that appeals to most consumers.

Is the Motorola Project Ara to do to smartphones what the IBM PC did for desktop computers?

Articles

Motorola unveils Project Ara, customizable smartphone effort | CNET

Motorola’s ‘Project Ara’ modular smartphone setup switches out hardware like apps  | Engadget

Project Ara: Motorola Wants to Make Your Smartphone Modular | Mashable

My Comments

The IBM PC of 1981 had not just become the standard for a business-class desktop computer as far as software was concerned but epitonised the concept of a highly-modular hardware design. This was highly evident in the way the computer’s system unit was designed where there were user-upgradeable parts, a concept that was so heavily underscored with the PC/AT “second-generation” design.

Here these computers had a continuous update and upgrade lifecycle where one could install faster microprocessors, highly-capable graphics cards, hard disks of increasing capacity, increased RAM, newer secondary-storage media like backup tapes, 3.5” disks and CD-ROMs  along with various communications devices like modems and network cards. This capability evolved with the ATX form factor along with newer smaller form-factors such as microITX.

In my experience with desktop computers since the early 1990s, I kept “dragging through”components from a previous chassis to a newer chassis to keep them useful and valid while being able to, in some cases, junk dud components like power supplies with nearly-worn-out fans and replace them myself. This has allowed me to maintain a longer service life for my desktop computing experience.and achieve this goal with minimal expense.

Similarly, I have seen most offices equipped with computers that have the “right mix” of software and hardware but where most of the componentry is affordable and the only expensive aspects of the system are components that suit a particular job. For that matter, this modularity opened up the business desktop-computing boom in the late 1980s.

Now Google’s Motorola smartphone arm is bringing this concept to the smartphone in the form of “click-together” components that snap on to a “skeleton” which is similar to a PC’s motherboard. Google wanted to achieve a platform for the hardware like what Android has done for the software. The goal with the Ara platform would be to have user-replaceable processors, displays, keyboards and the like that also allow these phones to work to newer technologies or work to specific needs.

For example, a higher-capacity flash storage could be planted in these phones or a Bluetooth module compliant to the latest Bluetooth specification could come in to play here. Similarly, the cracked screen could be easily replaced with something newer and brighter or an extra switch array could come in to place for one-touch access to functions. A newer sensor could come in to place to allow the phone to measure newer quantities as a dual-band 802.11ac Wi-Fi radio links the phone to the networks.

Of course this will lead to the longer service life for these phones as people “spin them out” further to their ever-changing needs and as technology marches onwards.

Google using TV white space to provide broadband in remote South Africa

Article – From the horse’s mouth

Google

Google Europe Blog: Improving Internet access in Africa with ‘White Spaces’

My Comments

What is “white space”?

A term that we will hear a fair bit of with Internet services is “white space”. This is UHF or VHF radio spectrum that has been newly created as the result of a nation or region switching from an analogue TV service to a digital TV service, which is typically more spectrum-efficient.

How is this relevant

The use of “white space” is becoming very appealing for Internet in rural and remote areas due to the fact that the VHF and UHF frequencies have relatively longer wavelengths than the frequencies used for most wireless-broadband applications. This allows for a longer distance between the base station and remote stations which suits this kind of deployment.

Such setups will be established on the concept of the fixed-wireless broadband setup where the customer-premises equipment will be connected to a fixed antenna (aerial), typically a rooftop aerial.

A lot of the talk about these services relates to whether these setups should be worked on licensed spectrum or the newly-free spectrum be declared in a manner to allow unlicensed use for this application, in a similar vein to Wi-Fi wireless.

In a test that was undertaken in some parts of rural USA by Google, it was proven that white space could be used as a wireless last-mile backhaul without interfering with existing TV stations and other spectrum users. This was through the use of a database which identifies channels that are used that is indexed by GPS-driven geographic parameters. The base station equipment are equipped with a GPS receiver to determine their geographic location and this comes in to play during the commissioning stage in order to determine the useable channels. Of course, the customer-premises equipment would seek for the frequencies associated with services that exist in a similar vein to a cable modem.

The African deployment

After Google had their success with the Kansas City fibre-driven next-generation-broadband rollout when it came to establishing an Internet-service, they put forward the idea of setting up a trial “white-space” fixed-wireless setup in some of the remote parts of South Africa. The idea is to establish access to Internet for the schools that are in this area.

It was organised in partnership with the Independent Communications Authority of South Africa, equivalent to the US’s FCC or UK’s Ofcom communications authorities and is assisted by broadcasters and the industry.

What I would see of this is a chance for African nations to observe this trial and see how it can allow for decent broadband service in to their remote areas. This will include assessing what kind of power is needed at the customer’s end so as to determine whether this could work on a solar power setup that serves one building.  Similarly, this could be assessed for establishing cellular-data backhauls for extending or improving access to Internet service via cost-effective wireless-broadband equipment in these areas.

Google Maps has now come back to the iPhone

Article

Google Maps is now available for iPhone | Official Google Blog

App Store location

Google Maps

My Comments

Previously, people who used the iPhone or iPad had the Google Maps provided as an integrated mapping solution for their devices. Then, when iOS 6 was launched, Apple decided to pull the Google Maps from the operating system and substitute it with a poor-quality mapping solution.

This has led to situations like people ending up in the wrong location and nearly dying, and the Victoria Police advising against using Apple Maps because of this poor-quality mapping.

There was so much criticism of this mapping solution that Apple had to bow to public demand and create an app group for third-party mapping apps for their iOS devices. Now, the Google Maps mapping solution has been made available to iOS 6 users through a downloadable app. This has the advantages of the Google Maps such as vector-driven maps, 3D views, turn-by-turn navigation and Street View but ported to the iOS platform.

For those of you who are still working with that trusty old iPhone 3GS, this app can work with that phone. Infact, any of you who are updating an iPhone or iPad to iOS 6 should infact factor in deploying Google Maps along with YouTube on the device as part of the update plans in order to gain the full benefit of these popular services on that iDevice. Similarly, when you buy that new iPhone or iPad, it may be a good idea to make these apps your first downloads from the App Store as part of commissioning that new device.

Google Secure Search–more than just privacy-enhancing

Article

Scareware slingers stumped by Google secure search • The Register

My Comments

Google has allowed users to perform a “Secure Search” option where their search-engine transactions are encrypted between the Google servers and their computer. This can be either facilitated through the user typing https://www.google.com or setting it as a default for their Google services account.

Obviously this feature is intended to provide a private secure-search sessions over open networks like Wi-Fi hotspots that are set up in the common open manner. But this also has a side benefit where destination Web sites don’t know what search terms are passed to them, thus making it harder to tune search search listings without the use of tools like Google Analytics.

The key obvious benefit is to stop the appearance of “poisoned” search listings that lead users to “scareware”. These are Trojan Horses which appear to be legitimate system utilities but are intended to separate the user from their money by spruiking horrendous system conditions to the user. Of course, I have had to deal with this menace by removing these programs from various friends’ computers.

The only limitation with this setup is that it only applies by default for people who are currently logged in to a Google service of some form like GMail. For users who share computers, they would have to start a Google-services session then head to the Google.com Website to start searching; or simply remember to type the https prefix. This can be achieved through the Google bookmark, favourite item or Intranet page hyperlink pointing to https://www.google.com .

At least this is another Web security item that offers more than is typically highlighted.

Authenticating users to services on limited-user-interface devices

Sony BDP-S390 Blu-Ray Disc Player

A Blu-ray player that has advanced set-top-box functionality and access to online services

There is an increasing trend to interlink services like photo-sharing and social-networking services with network-enabled devices other than PCs or “lightweight computers” like smartphones or tablet computers. This includes set-top boxes, network printers and digital picture frames and example applications include showing photo albums from Picasa or Facebook on the large TV, printing out pictures from Picasa or Facebook without the need for a computer or showing one’s Facebook Feed on an advanced Internet terminal like the Pure Sensia. One reason that is leading the concept on is the use of device platforms like HP ePrint, Panasonic VieraCast and Google TV, where an operating-system developer or a device manufacture use the platform to build up an “app” library for the device or operating system.

HP Photosmart 7510 multifunction inkjet printer

Printers even now can print material from online services

It will also become more common with VoIP telephony encouraging the development of “personal landline telephone” services as well as “personalised home environments” being brought about by home automation and security functions being part of the connected home.

The current situation

The main problem with these services is that they require the user to log in to the service using an alphanumeric user name and an alphanumeric password. This would be best done using the regular QWERTY keyboard of a computer.

But most of these devices would require one of these methods to enter the credentials:

TV remote control

A typical smart-TV remote control that can only offer “pick-and-choose” or 12-key data entry

  • “Pick-n-choose”, where the user uses a D-pad on the device’s control surface to pick letters from a letter grid shown on the device’s display. This is a method used primarily with set-top-box applications like “Pixel Eyes” (a Picasa / Filckr front-end) for TiVo; or used on most Internet radios to determine the network password for a Wi-Fi network.
  • Small on-screen QWERTY keyboard for a touchscreen device. This is a practice used on smartphones and tablet computers that have this interface but is becoming common with network printers and other devices that use a touchscreen. This interface can be awkward and prone to errors if the device uses a small screen as common with most printers.
  • “SMS-style” with a 12-key keyboard. This is where the device is equipped with a 12-key numeric keyboard not dissimilar to a telephone and the user enters the credentials as if they are tapping out a text message on a mobile phone. This practice may be used on communications devices (dialling phone numbers), security devices (entering access codes) or consumer electronics (direct-entry channel / track selection).
  • 26-key alphabetic keyboard. This is where each letter of the alphabet is allocated a key usually in a 5×5 matrix in alphabetical order. You still may have to press a button to change case or switch to numeric or punctuation mode. This has been used with some of Sony’s MiniDisc decks for track labelling and is still used with some Brother labellers for entering label text, but is not commonly being used as a text-entry method for consumer electronics devices due to size, design or cost limitations.

As well, most of the implementations don’t allow for proper “hot-seat” operation by remembering just the user name; and therefore require the user to provide both the user-name and password when they want to use the service. This can then be made more awkward with the interfaces listed above.

Facebook’s login method

HP Envy 100 all-in-one printer (D410a)

HP Envy 100 all-in-one printer -implementing a simplified device enrollment for Facebook’s HP ePrint setup

Facebook have improved on this with their HP ePrint app which is part of the HP Envy 100 printer which I have on loan for review. Here, the printer displayed an “authentication code” which I had to enter in to the Facebook Devices page (http://www.facebook.com/device). Here, you would have to log in with your Facebook credentials if you haven’t done so already. Then the printer is associated with your Facebook account.

The only limitation with this method is that the device is bound to only one FB account and multiple users can’t switch between their Facebook accounts. This can also make a Facebook user more vulnerable to undesirable control-panel modification to their account if the app allows it.

The reality with most devices

Most devices like network printers or set-top boxes are typically operated by multiple users. What needs to happen is a simplified multi-user login and authentication experience that suits this class of device.

This is also more so as the authentication parameters used by Google (Picasa, YouTube), Facebook and others are becoming central to the “single sign-on” environments offered by these service providers and these “single sign-on” providers could appeal as credentials bases for home network applications like NAS management or even building security.

What could be done

A situation using a combination of the “Facebook limited-device login” method and the login experience that one encounters when using an automatic teller machine or EFTPOS terminal would be appropriate here. This is where a device can keep multiple “device account codes” for multiple accounts as well as securing these accounts with a numeric PIN.

Main points

A credentials service like Facebook, Windows Live or Google could add a simplified “numeric PIN” field for limited user-interface devices as well as the text-based password. The simplified “numeric PIN” which would be four or six digits long would only be able to work on qualified devices and the user would need to key in their text-based password to log in from a computer or smartphone.

Devices that support “limited interface” operation create a “device account passcode” for each account that is to use the device. This allows the device to create a reference between the account on the service and the account on the device. When a user is added to the device, this would be shown on the device’s user interface and the user enters this in to a “Devices Login” page at the credentials service’s Website.

Add user

  1. A user selects the option to “add user” to the device using the device’s control surface.
  2. The device’s user interface creates a “device account passcode” and shows it on the device’s user-interface (LCD display, TV screen, etc). In the case of a network printer, it could also print out this “account passcode”.
  3. The user transcribes this “device account passcode” to the credentials service Website (Google, Facebook, Windows Live, etc) using a regular computer or other Web-browser-equipped device.
  4. If the user hasn’t previously defined a numeric PIN for “limited-interface access”, the service invites the user to enter and confirm a numeric PIN of own choosing if they agree to “protected device access”. This could be done either through the Web browser or continued at the device’s control surface.
    If they have previously defined the numeric PIN, the device will challenge them to enter the numeric PIN using its control surface.
  5. The user’s account is bound to the device and the user would be logged in.

Switching between users on a device;

1 A user would go to the “Users” menu on the device and selects their user name represented as how they are known on the credentials service (Facebook name, etc) from the user list.

2 The user then keys in the numeric PIN using the device’s control surface

3 If successful, the device is “given” to the user and the user then interacts with the service from the device’s control surface

Other points of note

All users have opportunity to “remove themselves” from the device by going to the “user settings” UI and selecting “Remove User” option. Some devices may allow privileged users to remove other users from the device and there could be the option for users to change their numeric PIN from the device’s control surface.

It could be feasible for a device to provide varying levels of access to a user’s account. For example, a device shared by a household could allow “view-only” access to certain data while a user who is directly logged in can add or modify the data.

There could be the option to integrate local user-authentication information on devices that support this by relating the “device passcode” with the local user-authentication data record. This could allow a device like a security system to allow the user to gain access to functionalities associated with the credentials service but the user still uses their regular passcode associated with the device.

Conclusion

Once companies like social-networking or photo-sharing sites work on ways to support multi-user one-device scenarios with limited user-interface devices, this could open up paths of innovation for the devices and the services.