Tag: WiFi wireless

Why buy a network-enabled printer instead of a direct-connected printer?

Most printer manufacturers are supplying printers and multifunction printer (all-in-one) devices that can connect to computers via a network as well as via a USB port in price ranges that most consumers and small businesses can afford.

This function has initially been provided to higher-end business-grade equipment primarily as a way of integrating them in to the business’s network and allowing them to be used by all the computers in that workplace. Now that home networks are becoming increasingly common primarily due to broadband Internet and Wi-Fi networking, this function is becoming commonly available in all but the cheapest equipment in most manufacturers’ product ranges.

You may think that a direct-connect printer is the only type of printer that you need for your home or small-business computer but it may be worth thinking about the advantages of the network-connected units now that this feature is available at an increasingly-affordable price. Similarly you may think of using a direct-connect printer with a print server such as the functionality integrated in to many recent-model routers. But there may be limitations in how this setup works, especially with the multifunction devices that are increasingly being deployed.

Many computers – few printers

You will typically end up with many computers but fewer printers in your home or small business and may find that there are particular printers that offer capabilities that are unique to them.

A network printer allows each computer to benefit from that printer’s capabilities without any need to shift the unit around or disconnect and reconnect USB cables. You also move away from the temptation to buy and maintain many cheaper printers for each computer and end up saving money in the long run.

This can allow you to invest in printers that are good for particular needs rather than a fleet of machines that effectively do the same job. A good example of this would be a medical clinic’s setup where there is a networked monochrome laser printer that turns out health-insurance forms, patient receipts and similar documents very quickly for a group of reception-desk computers and a networked colour inkjet multifunction printer that does general-purpose printing where speed isn’t necessary.

Network-capable multifunction printers expose all of their functions to the networks rather than just the printing function. This can allow for increased flexibility when it comes to scanning or “drawing-down” images from memory cards because these functions end up being shared by all the computer users. If the machine has fax functionality, there is the ability to “print-to-fax” via the network whenever you want to send a fax from one of the computers.

The “new home-computing environment”

We are also starting to see the arrival of the “new home-computing environment” where the computers in the household are laptops that are connected via Wi-Fi wireless to a wireless router. This has allowed users to use the computers anywhere in the house rather than just in the study or home office.

A network-enabled printer can allow you to avoid the need to locate the printer and connect laptop computers to it whenever you wish to print anything. Rather, you can start a print job from the laptop that you are using at the location you are using it at. You also benefit from the increased flexibility of locating the printer wherever you wish, especially if you use Wi-Fi wireless or HomePlug powerline networking to connect the printer to the network.

Conclusion

So if you are wanting to choose a printer that provides for flexibility in your network environment, it would be worth it to consider units that are network enabled.

Why buy a network-enabled printer instead of a direct-connected printer?

Most printer manufacturers are supplying printers and multifunction printer (all-in-one) devices that can connect to computers via a network as well as via a USB port in price ranges that most consumers and small businesses can afford.

This function has initially been provided to higher-end business-grade equipment primarily as a way of integrating them in to the business’s network and allowing them to be used by all the computers in that workplace. Now that home networks are becoming increasingly common primarily due to broadband Internet and Wi-Fi networking, this function is becoming commonly available in all but the cheapest equipment in most manufacturers’ product ranges.

You may think that a direct-connect printer is the only type of printer that you need for your home or small-business computer but it may be worth thinking about the advantages of the network-connected units now that this feature is available at an increasingly-affordable price. Similarly you may think of using a direct-connect printer with a print server such as the functionality integrated in to many recent-model routers. But there may be limitations in how this setup works, especially with the multifunction devices that are increasingly being deployed.

Many computers – few printers

You will typically end up with many computers but fewer printers in your home or small business and may find that there are particular printers that offer capabilities that are unique to them.

A network printer allows each computer to benefit from that printer’s capabilities without any need to shift the unit around or disconnect and reconnect USB cables. You also move away from the temptation to buy and maintain many cheaper printers for each computer and end up saving money in the long run.

This can allow you to invest in printers that are good for particular needs rather than a fleet of machines that effectively do the same job. A good example of this would be a medical clinic’s setup where there is a networked monochrome laser printer that turns out health-insurance forms, patient receipts and similar documents very quickly for a group of reception-desk computers and a networked colour inkjet multifunction printer that does general-purpose printing where speed isn’t necessary.

Network-capable multifunction printers expose all of their functions to the networks rather than just the printing function. This can allow for increased flexibility when it comes to scanning or “drawing-down” images from memory cards because these functions end up being shared by all the computer users. If the machine has fax functionality, there is the ability to “print-to-fax” via the network whenever you want to send a fax from one of the computers.

The “new home-computing environment”

We are also starting to see the arrival of the “new home-computing environment” where the computers in the household are laptops that are connected via Wi-Fi wireless to a wireless router. This has allowed users to use the computers anywhere in the house rather than just in the study or home office.

A network-enabled printer can allow you to avoid the need to locate the printer and connect laptop computers to it whenever you wish to print anything. Rather, you can start a print job from the laptop that you are using at the location you are using it at. You also benefit from the increased flexibility of locating the printer wherever you wish, especially if you use Wi-Fi wireless or HomePlug powerline networking to connect the printer to the network.

Conclusion

So if you are wanting to choose a printer that provides for flexibility in your network environment, it would be worth it to consider units that are network enabled.

Debunking the hysteria and paranoia about Google’s Street View Wi-Fi site surveys

Introduction

Over this last few weeks, there has been hysterical media and political activity in Europe and Australia concerning Google’s Street View activities. This activity has become focused on the collection of Wi-Fi network data by the Street Survey vehicles which grab the initial street images.

The hysteria focused on identifying details about Internet use and Wi-Fi devices that existed at individuals’ addresses and that this data could be used to spy on individuals.

The truth

Wi-Fi site surveys are a part of Wi-Fi networking life

The Wi-Fi site survey is associated with nefarious activities like wardriving but it is commonly practised as part of Wi-Fi network use.

When you want to connect to your Wi-Fi wireless network with a client device, you will come to a point in the device’s setup operation where you see a list of SSIDs, then you choose the SSID that you wish to connect to. This is an elementary form of a site survey.

This is extended to technology enthusiasts like myself who activate Wi-Fi network scanning functions on smartphones to see a list of wireless networks operating in the neighbourhood that they are in for curiosity’s sake. Here, we see the list of SSIDs and an icon beside each SSID that indicates whether the network is protected or not. The practice also extends to use of “Wi-Fi-finder” devices to look for open Wi-Fi networks.

Similarly, people who are optimising wireless networks will use software like inSSIDer (which I have reviewed) or HeatMapper for site surveys and wireless-network optimisation. This software can also yield information about the BSSID and operating channel for that particular SSID and more sophisticated versions can use spectrum analysers to determine interfering frequencies or determine the location using support for GPS modules.

This leads me to Navizon and Skyhook Wireless who have done these surveys in order to turn these beacons in to a location tool in a similar manner to GPS or mobile-phone-tower-based positioning. The most common application of this is the Apple iPhone platform which uses this information for locating the phone during setup, avoiding the need for users to determine their time zone or location.

What does my Wi-Fi network yield

A normally-setup wireless access point or router will send out a “beacon” with contains the following data:

  • SSID or ESSID which is the wireless network name
  • BSSID which is the MAC address for the access point’s radio transceiver. This MAC address does not have any relationship to the Ethernet MAC address or the broadband (WAN) interface’s MAC address on your wireless router.
  • Information required to determine security protocol to establish a successful conection

This data that is in this “beacon” is publicly available in a similar context to the information written on a vehicle’s registration label which would have the registration number (written on the number plates / license plates) and the VIN (vehicle identification number) for that vehicle.

It is also worth knowing that all access points and wireless routers have the option to turn off SSID broadcast. Here, you don’t have the SSID made available but have the network listed as a “hidden network” on some devices. This is something you can do in your router’s or access point’s Web-based management interface

When your network client devices are active in your wireless network and are “talking” to your wireless access point or router, they don’t broadcast an SSID or other beacon because they have “latched on” to that access point or router. This data will usually be encrypeted as part of the WPA security protocols that should be in place on your private wireless network.

Conclusion

Once you know how the Wi-Fi network works, you should then know that a site-survey operation should not gather the actual data that is moved across the network.

AVM FritzWLAN Repeater NG – competition to the Apple Airport Express

Product Page

AVM FritzWLAN Repeater NG – manufacturer’s page (German language)

My comments

This gadget had intrigued me not just because it was a WDS-compliant Wi-Fi network repeater for all of the Wi-Fi networks but was a DLNA-compliant media player without a control surface.

It plugs in to an AC outlet in a similar manner to a HomePlug wireless access point like a Netcomm NP290W, Solwise ‘85PEW or Devolo dLAN Wireless unit. But this connection only exists to power the unit and, at the moment, is available only to fit the Continental-European power outlet.

The main strength in my opinion is its prowess as a network music player for the DLNA Home Media Network. It can be controlled by Windows Media Player 12, recent Nokia phones, TwonkyMedia Manager, an iPhone running PlugPlayer; and other UPnP AV Control Points or through its Web user interface. That same Web user interface can be used to select between six different Internet-radio streams of your choice but you would have to know the URLs of these streams.

You can connect it directly to a music system via its line input or digital input or enable a built-in “flea-power” FM transmitter to have it play through an FM radio tuned to a frequency that you nominate through the Web interface.

The closest competition to this device would be the Apple Airport Express which works as a USB print server, wireless-only router or network music player that only works with iTunes.

What I would like to see for this device would be to have it able to work beyond Continental Europe i.e. available with plugs to suit North America, UK, Australia and other markets. If extra value were to be applied to this device. It could also be improved with HomePlug AV and Ethernet connectivity in a similar manner to the aforementioned HomePlug wireless access points and work properly in an extended service set with client roaming to latest specifications.

The Internet-radio functionality could be improved by having the FritzWLAN Repeater work with an established Internet-radio directory like vTuner, Reciva or RadioTime to select the radio streams. This could then be taken further with access to the user favourites functions that the directories have.

The main take from this is that AVM have pushed the boundaries by adding a standards-based media player to a Wi-Fi network repeater instead of following the crowd.

Keeping the WiFi public hotspot industry safe

Originally published: 12 March 2009  – Latest update 20 April 2010

There are an increasing number of WiFi wireless hotspots being set up, mainly as a customer-service extra by cafe and bar operators. But there have been a few security issues that are likely to put users, especially business users off benefiting from these hotspots.

This is becoming more real due to netbooks, mobile Internet devices, WiFi-capable smartphones and other easily-portable computing devices becoming more common. The hotspots will become increasingly important as people take these devices with them everywhere they go and manage their personal or business data on them.

The primary risk to hotspot security

The main risk is the “fake hotspot” or “evil twin:. These are computers or smart routers that are set up in a cafe or bar frequented by travellers, business people or others who expect Internet access. They can be set up in competition to an existing hotspot that offers paid-for or limited-access service or on the fringes of an existing hotspot or hotzone. They offer the promise of free Internet access but exist for catching users’ private information and/or sending users to malware-laden fake Websites hosted on the computers.

Standard customer-education practices

The common rhetoric that is given for wireless-hotspot security is for the customer to put most of their effort into protecting their own data without the business owner realising that their hotspot service could be turning in to a liability. This can then lead to the hotspot service gathering dust due to disuse by the customers it was intended to serve.

The typical advice given to users is to check whether the premises is running a wireless hotspot or if there is a hotzone operating in the neighbourhood before switching on the wireless network ability in your laptop computer. Then make sure that you log on to a network identified by a legitimate ESSID when you switch on the wireless network ability.

Other suggestions include use of VPNs for all Web activity, which can become difficult for most personal Web users such as those with limited computer experience. Some people even advise against using public Internet facilities like Internet cafes and wireless hotspots for any computing activity that is confidential on a personal or business level.

But everyone involved in providing the free or paid-for hotspot service will need to put effort into assuring a secure yet accessible hotspot which provides a high service quality for all users. This encompasses the equipment vendors, wireless Internet service providers and the premises owners.

Signage and operating practices

When Intel promoted the Centrino chipset for laptop computers, they promoted wireless hotspot areas that were trusted by having a sticker with the Centrino butterfly logo at eye level on the door and the premises being scattered with table tent cards with that same logo. Similarly hotspot service providers and wireless Internet service providers used similar signage to promote their hotspots.

But most business operators, especially small independently-run cafes and bars, commonly deploy “hotspot-in-a-box” solutions where they connect a special wireless router that they have bought to their Internet service and do their own promotion of the service. This may simply be in the form of a home-printed sign on the door or window or a home-printed display sign near the cash register advising of WiFi hotspot service.

An improvement on this could be in the form of the ESSID matching the business’s name and listed on the signage, which should have the business’s official logo. Similarly, the network could be set up with WPA-PSK security at least with the passphrase given to the customers by the business’s staff members when they order hotspot service. Most “hotspot in a box” setups that list the customer’s username and password on a paper docket also list the ESSID and WPA-PSK passphrase on these dockets. As well, I would modify the login page to convey the business’s look with the business’s logo and colours. A complimentary-use hotspot could be secured with a WPA-PSK passphrase and the customer having to ask the staff member about the passphrase. This could allow the facility to know who is using the hotspot and the organisation who runs that hotspot can have better control over it.

It may be worth the industry investigating the feasibility of using WPA-Enterprise security which is associated with different usernames and passwords for access to the wireless network. Most portable computers and handheld devices in current use can support WPA-Enterprise networks. This can be implemented with the typical “paper-docket” model used by most “hotspot-in-a-box” setups if the authentication system used in these units works as a RADIUS server and the built-in wireless access point supports WPA-Enterprise with the unit’s built-in RADIUS server. The same setup could work well with a membership-based hotspot service like a public library with the RADIUS server linked to the membership database. But it may not work easily with hotspot setups that work on a “self-service” model such as paid-service hotspots that require the user to key in their credit-card number through a Webpage or free-service hotspots that use a “click-wrap” arrangement for honouring their usage terms and conditions.

The organisation who runs the hotspot should also be aware of other public-access wireless networks operating in their vicinity, such as an outdoor hotzone or municipal wireless network that covers their neighbourhood; and regularly monitor the quality of service provided by their hotspot. Also, they need to pay attention to any customer issues regarding the hotspot’s operation such as “dead zones” or unexpected disconnections.

People who own private-access wireless networks should also keep these networks secure through setting up WPA-secured wireless networks. They should also check the quality of their network’s service and keep an eye on sudden changes in their network’s behaviour.

When wireless-network operators keep regular tabs on the network’s quality of service, they can be in a better position to identify rogue “evil-twin” hotspots

Improved standards for authenticating wireless networks

There needs to be some technical improvement on various WiFi standards to permit authentication of WiFi networks in a manner similar to how SSL-secured Web sites are authenticated. This could be based around a “digital certificate” which has information about the hotspot, especially:

  • the ESSID of the network ,
  • the BSSID (wireless network MAC) of each of the access points,
  • the LAN IP address and MAC number of the Internet gateway
  • the venue name and address and
  • the business’s official name and address.

The certificate, which would be signed by public-key / private-key method could be part of the “beacon” which announces the network. It would work with the software which manages the wireless network client so it can identify a wireless network as being secure or trusted if the signature is intact and the network client is attached to the network from the listed BSSIDs and is linking to the gateway LAN IP.

The user experience would be very similar to most Internet-based banking or shopping Websites where there is a “padlock” symbol to denote that the user is using an SSL-secured Website with an intact certificate. It will also be like Internet Explorer 7 and 8 where the address bar turns green for a “High-Assurance” certificate which requires higher standards. In this case, the user interface could use colour-coding and / or a distinctive icon for indicating a verified public network.

The provision of cost-effective wireless-network management software

There are some programs that can turn a laptop computer in to a wireless-network survey tool, but most of them don’t show much useful information, are hard to operate for anyone other than a network technician; or are too costly. They miss the needs of people who run home or small-business wireless networks or wireless hotspots.

What needs to exist is low-cost wireless-network management software that can work with the common Microsoft or Apple platforms on computers that have common wireless . The software should be able to use commonly-available wireless network adaptors such as the Intel Centrino platform to perform site surveys on the WiFi bands and display the activity on these bands in an easy-to-view but comprehensive manner. The software should be easy to use for most people so they can spot interference to their wireless network easily and can “tune” their wireless network for best performance.

An application that is matching this need is MetaGeek’s inSSIDer, a free wireless-network site survey tool for the Windows platform which I have reviewed in this blog. It has the ability to list all the networks receivable by signal strength, MAC address, SSID or channel; or plot a graph of the networks by signal strength over time; or plot a graph of all the access points by signal strength over channel. This may help with managing your hotspot by identifying rogue access points and “evil-twin” hotspots.

Similarly the popular smartphone and PDA platforms like Applie iPhone, Android, Symbian S60 / UIQ, Blackberry and Microsoft Windows Mobile could have low-cost wireless-network management software written for them so they can make a handheld PDA or mobile phone work as a site-survey tool for assessing quality of service.

Once this kind of software is available for small business and home users, it empowers them to assure proper coverage of their network and check for any “evil twin” or other rogue hotspots being set up to catch customers.

Summary

There needs to be more effort put in to setting up secure public-access wireless networks so that people can benefit from portable computing anywhere without forfeiting the confidentiality of their personal or corporate data.

It also will encourage people to gain the maximum value out of their WiFi-enabled portable information devices whether for their business life or their personal life.

Product Review – MetaGeek inSSIDer Wireless Network Analyser

The program is a free download from the MetaGeek Website or other download directories like TuCOWS or CNet. There is another application from this same team that works with a 2.4GHz spectrum analyzer for use in determining interference on this band, but it comes at extra cost.

The installation routine didn’t take long when I installed it on a Dell Studio 15 laptop that was lent to me as a review sample. It could work with the standard Wi-Fi network card that came with this laptop and could therefore work with any Wi-Fi network adaptor that is used with the host computer.

The program provides a “dashboard” with three concurrent views:inssider-screen

  • a table which lists the Wi-Fi networks that the program can find with their SSID, BSSID (MAC address) and channel for each detected wireless network.
  • a signal-strength / time graph for all of the discovered Wi-Fi networks
  • a signal-strength / channel graph for all of the discovered Wi-Fi networks

As far as I am concerned, the highlight of this program is the signal-strength / channel graph which is useful for identifying channel clashes or blank channels that you can tune the wireless access point to.

One of the main limitations is that it doesn’t detect “extended service set” networks nor does it support detection of multi-SSID access points which become a wireless on-ramp for many networks.. This may be of concern when using this program to manage routers with “guest-network” functionality or managing hotspots. Another improvement that I would like to see would be to provide for network grouping by SSID or BSSID (MAC address) so you can identify “foreign” networks easily.This would then help in identifying rogue access points or “evil-twin” hotspots easily.

I would then determine it as being very useful for “tuning” a wireless access point or router so it can coexist with other Wi-Fi networks, either as part of setting one up or troubleshooting a network. I would also recommend it as an essential tool for hotspot owners who want to keep their hotspot networks operating in an optimum manner and providing good customer service. It can also work well in “smoking out” rogue access points or fake “evil-twin” hotspots.

The Android-driven Wi-Fi cordless phone that thinks it’s a smartphone

News and Blog articles

DSP Group’s Android DECT / Wi-Fi Home Phone Reference Design Has Me Drooling | eHomeUpgrade

DSP Multimedia Handset – Android Based Home Phone | Android Community

From the horse’s mouth

DSP Group’s “video brochure” available on YouTube

DSP Group’s Web page on this phone

My comments on this phone

Most of the news concerning Android is focused on smartphones that are pitched as cellular mobile phones. But this phone is an intent to take Android to a new territory – the home cordless phone which is used as a household’s “common phone”.

Here, it uses VoIP technology through a Wi-Fi network (which nearly all home networks are based around) but can work as a DECT-based cordless phone. But it can work with a home network by providing DLNA functionality, access to home automation, consumer-electronics control; as well as being a hand-held Internet terminal. Telephony service providers like Telstra can customise the phone to suit their needs such as providing a branded customer experience like they do with mobile phones. This can also extend to hosted-PBX providers providing this phone as part of an IP-based business phone system for a small business.

This has been achieved through the use of Google Android as the phone’s operating environment and the phone being able to gain access to applications provided for the Google Android MarketPlace. This can open up this home phone for all sorts of innovative applications. I would also extend this to business-related applications including order-entry for restaurants or tourist information for the hospitality industry.

This phone has become the first reference design for an in-home / in-premises cordless phone to have an interface and level of functionality that puts it on a par with today’s smartphones. It will also definitely appeal to the competitive “triple-play” marketplace that is being built out in different countries around the world and could herald the beginning of a new age of “in-premises” telephony.

Use of the Ekahau Real-Time Location System in a residential or small-business environment

I have been talking by e-mail to Mika Kouhia from Ekahau about the use of their WiFi-based real-time location technology in the typical home or small-business network. The applications that may come to mind here will typically cover an emergency-response / nurse-call system that is an integral part of the at-home care of elderly, infirm or convalescing people; or small businesses, especially those who are partners to large business, who need to track assets in a similar manner to what is done by large organisations.

What is the main complication that concerns the Ekahau Real-Time Location System

The main complication that limits this technology is the fact that most of the wireless networks deployed in this space only have one access point, typically the one that is integrated in to a wireless router. You may be lucky to use this technology on a wireless network that has an extra access point such as a wireless router that is repurposed as an extension access point and connected to the main router via a HomePlug powerline link or one of those access points that work with a HomePlug powerline backbone.  On the other hand, you would have to deploy “infrared beacons” around the premises and rely on the Wi-Fi wireless link provided by the router as primarily a communications link.

The infrared beacons work on a similar infrared frequency to the remote controls used to control the majority of TV sets and other consumer-electronics devices in circulation. Thus they won’t interfere with the passive-infrared sensors used in most security systems or automatic “sensor-light” setups because these sensors are tuned to an infrared frequency emitted as part of body heat.

The primary reason for implementing the technology in the home

Ekahau T301BD Wi-Fi Pager Tag

The primary implementation that I was talking about with Mika was to use their T301BD Wi-Fi Pager Tag which hangs around the neck of a person. This tag has an integrated display and two function buttons that also work as emergency-call buttons. As well, if the tag is pulled on the neckstrap, it can initiate an emergency response. The tag supports direct paging with push-button response, which can allow it to work with a “response-check” setup where if the user doesn’t respond within a certain time to a call, the system initiates emergency action. The display could come in handy by showing the person’s name, which would be a good help with people who have memory-loss disorders.

In this implementation, there may be the need to establish Internet access to the pager tag in order to permit this device to work as part of a solution provided by an external service provider. This may involve use of hardware or software on the network that provides at least dynamic DNS functionality and integration with UPnP IGD-enabled routers to provide access to the tag. The functionality could be extended to provide local nurse-call functionality with in-house location display through a local screen and / or Web page available through the home network.

Similarly, the pager tag could work with other technology to assist people who have memory-loss disorders by enabling the use of electronically-generated “reminder screens” for particular tasks. This is relevant to an article that I wrote about in my blog concerning technology that is to assist the elderly in their daily lives. Here, I had talked about a kitchen equipped with various technologies like pico-projection systems, RFID and Wii-style motion sensors to provide reminders through different food-preparation tasks.

How this could be taken further

Ekahau should then consider studying this application as a technology that suits the current home-driven health-care direction.

Here, we are dealing with an older population as people of the baby boom move in to the later years of life and more people live longer. As well, there is more emphasis on home-based health-care so as to provide patients with the dignity of being looked after in their own home environment. This also includes an emphasis on independent living for elderly people, including having younger relatives be part of the older person’s life in a support role.

Similarly, there are disabled or chronically-ill people who want to be in the familiarity of their own home and family and these people can be able to work as carers, whether alone or alongside paid staff members who work on a rostered system.

The supporting software could be integrated in to computing devices that work on any of the common desktop-computing, handheld-computing, set-top box or embedded-device platforms in order to establish an assistive-technology ecosystem in the home.

The touchscreen smartphones with the works

News articles

Samsung unveils Bluetooth 3.0, 802.11n smartphone • Register Hardware

MWC: Samsung Rolls Out Wave Smartphone with Bada OS | eWeek.com

Samsung reveals first Android phone with DLP Pico projector | Android And Me blog

My comments about these phones

I had never thought that someone would come up with touchscreen smartphones that would beat the Apple iPhone hands down in many ways. What Samsung have done with the new Wave touchscreen smartphone and the Halo Android-based touchscreen projector smartphone that they launched at the Mobile World Congress in Spain has, in my opinion, achieved this goal.

One feature that I liked about the Wave and Halo phone were that they were the first few touchscreen smartphone devices to use the OLED technology for its display. This display, which I commented about in my review of my Nokia N85 smartphone, has a lot of advantages over the common LCD display used, such as high contrast and improved energy efficiency. I have often described these displays as being “vacuum-fluorescent displays for battery-operated devices” because they have the same high-contrast display as the vacuum-fluorescent displays found on most home-installed consumer-electronics devices, yet they don’t need as much power to operate as those displays.

Other things that I have liked about the Wave phone include the use of a Bluetooth stack that works to the current Bluetooth 3.0 standard which allows for high-speed data transfer when used in conjunction with the phone’s Wi-Fi transceiver. Speaking of that, the Wi-Fi transceiver is capable of working as a single-stream 802.11n unit which can allow higher throughput on 802.11n Wi-Fi networks. The Android-powered Halo has Bluetooth to 2.1, but has the 802.11n single-stream Wi-Fi.

As well as launching this smartphone at Mobile World Congress, Samsung had established an app-store and developer network so they can compete with Apple when it comes to applications that extend the phone’s function. They are also part of the Wholesale Applications Community which will improve the marketplace for smartphone applications.

Both phones use a micro-SD card slot for memory expansion or “cassette-style” operation when used as a media player. They use a USB connection and a 3.5mm headset jack which makes them compatible with most standards-based mobile phones and accessories. The Android-equipped Halo smartphone will, as far as I know, offer DLNA home media network integration of some sort.

From all that I have heard about these phones, Samsung, who are part of the “New Japan”, has “dipped their toes” in many smartphone platforms and has offered OLED touchscreen smartphones in two different platforms.

Consumer Electronics Show 2010

I have written some other posts about the Consumer Electronics Show 2010, mainly about the rise of Android and about Skype being integrated in to regular TV sets. But this is the main post about what has been going on at this show.

TV technologies

The main technologies that were present at this year’s Consumer Electronics Show were those technologies related to the TV set.

US consumers are in a TV upgrade cycle due to the country undergoing a digital TV switchover and are preferring flatscreen sets over CRT sets. This is even though there are digital-TV set-top boxes being made available at very cheap prices and through government subsidy programs. The main reality is that the older sets will be “pushed down” to applications like the spare bedroom with the newer sets being used in the primary viewing areas.

Screen Technologies

The main technology that is capturing the CES show floor is 3D TV. This has been brought on by the success of “Avatar” and requires a 3D-capable TV and, for Blu-Ray discs, a 3D-capable Blu-Ray player. In the case of broadcast content, some HD-capable set-top boxes and PVRs that are in the field can be upgraded to 3D functionality through an “in-the-field” firmware update.

In most cases, viewers will need to wear special glasses to view the images with full effect and most implementations will be base on the “RealD” platform. Some eyewear manufacturers are even jumping in on the act to provide “ready-to-wear” and prescription glasses for this purpose.

Vizio had also introduced a 21:9 widescreen TV even though activity on this aspect ratio had become very dormant.

Blu-Ray

The US market has cracked key price marks for standalone lounge-room players and there is an increase in the supply of second-tier models, especially integrated “home-theatre-in-box” systems and low-cost players.

US ATSC Mobile DTV standard

You may not be able to get away from the “boob tube” at all in America with portable-TV products based on the new ATSC Mobile digital TV standard which has been released to the market this year.

LG are launching a mobile phone and a portable DVD player with mobile DTV reception capability. They are also releasing a mobile ATSC DTV tuner chip that is optimised for use in in-car tuners, laptops and similar designs. Vizio are also releasing a range of handheld LED-backlit LCD TVs for this standard.

A key issue that may need to be worked out with this standard is whether an ATSC Mobile DTV device can pick up regular over-the-air ATSC content. This is more so if companies use this technology as the TV-reception technology for small-screen transportable TVs typically sold at the low-end of the TV-receiver market. It is also of concern with computer implementations where a computer may be used as a “one-stop entertainment shop” with TV-reception abilities.

There is a small Mobile-DTV – WiFi network tuner, known as the Tivit, that was shown at the CES. It is a battery-operated device that is the size of an iPhone and uses the WiFi technology to pass mobile TV content to a laptop, PDA or smartphone that is running the appropriate client software. It has a continuous “battery-only” run-time of 3 hours but can be charged from a supplied AC adaptor or USB port. I consider this product as being a highly-disruptive device that could be deployed in, for example, a classroom to “pass around” TV content, but it also has its purpose as something to show the ballgame on a laptop during the tailgate picnic. The main question I have about this is whether it can be a DLNA broadcast server so that people can use them with any software or hardware DLNA-based media playback client.

Network-enabled TV viewing

This now leads me to report on what is happening with integrating the TV with the home network.

More of the “over-the-top” IPTV and video-on-demand solutions (Netflix, CinemaNow, Hulu, etc) are becoming part of most network-enabled home video equipment. In the US, this may make the concept of “pulling out the cable-TV cable” (detaching from multichannel pay-TV services) real without the users forfeiting the good content. They could easily run with off-the-air network TV or basic cable TV and download good movies and television serials through services like Netfilx or Hulu.

The main enabler of this would be the “Smart TVs” which connect to the home network and the Internet, thus providing on-screen data widgets, YouTube integration, DLNA content access, as well as the “over-the-top” services. Even so, the TV doesn’t necessarily have to have this functionality in it due to peripheral devices like home-theatre receivers (Sherwood RD-7505N) and multimedia hard disks (Iomega ScreenPlay Director HD) having these functions. Of course, games consoles wouldn’t be considered complete nowadays unless they have the functionality.

RF-based two-way remote control

Some home-AV manufacturers are moving away from the regular one-way infrared remote control, mainly in order to achieve increased capability and increased reliability. These setups are typically in the form of a hardware remote control or software remote control application that runs on a smartphone and they use Bluetooth as a way of communicating with the device.

These setups will typically require the customer to “pair” the remote control or the smartphone as part of device setup, which will be an experience similar to pairing a Bluetooth headset with a mobile phone. They have infra-red as a user-enabled fallback method for use with universal remote controls, but this could at least foil the likes of disruptive devices like “TV Turn-Off”.

The main driver behind this form of two-way remote control is to provide a secondary screen for interactive video such as BD-Live Blu-Ray discs. Infact, Michael Jackson’s “This Is It” Blu-Ray disc implements this technology in the form of an iPhone app which links with certain Blu-Ray players to use the iPhone’s user interface as a jukebox for the title.

Smartphones and MIDs

Previously, I had done a blog article on the rise of the Android platform as a challenger to the Apple iPhone market share as far as smartphones are concerned.. There is even talk of Android working beyond the smartphone and the MID towards other device types like set-top boxes and the like, with some prototype devices being run on this operating system.

There is an up-and-coming MID in the form of the Adam Internet Tablet MID. This Android-based unit which can link to WiFi netwoks and has a 32Gb SSD, also has a new display-type combination in the form of an anti-glare LCD / e-ink display

This year. the “smartbook” is gaining prominence as a new general-purpose computing form factor. It is a computer that looks like a netbook but is smaller than one of them. It is powered by an ARM-processor abd could run integrated 3G or cellular calls; and its functionality is more equivalent to that of a smartphone.

There have been some E-book readers shown but these are mostly tied to a particular publisher or retail chain.

Connected Car Media

Pioneer and Alpine have equipped their top-of-the-line multimedia head units with “connected radio” functionality. This function works with a USB-tethered iPhone running the Pandora Internet Radio app. Both these solutions act as a “controller” for the Pandora app, with the iPhone pulling in the online content through that service. The Pioneer solution also offers a “virtual-DJ” function in the form of an extended-functionality app that works alongside iTunes. All these solutions are intended to appeal to the young fashion-conscious male who sees the iPhone as a status symbol and likes to have his car “thumping” with the latest tunes. These solutions don’t seem to go anywhere beyond that market, whether with other mobile-phone platforms or other online-media applications like Internet-radio streams.

Ford  have developed the MyFord sophisticated dashboard and online telematics system and were demonstrating it at this show. This will work with a user-supplied 3G modem and also supports WiFi router functionality. Typically, this will be rolled out to the top-end of Ford’s US market, such as the Lincoln and Mercury vehicles.

Digital Photography

The new cameras of this year have seen improved user-interfaces, including the use of touchscreen technology and some manufacturers are toying with the use of fuel-cell technology as a power-supply method.

As far as network integration goes, Canon have enabled their EOS 7D digital SLR with this functionality once equipped with the optional Canon WiFi adaptor. This solution even provides for DLNA media-playback functionality.

The aftermarket Eye-Fi WiFi SD memory card was shown as a version, known as the Pro Series, that can associate with 802.11n networks.

The unanswered question with network-enabled digital photography hardware is how and whether these solutions will suit the needs of many professional photographers.  The main questions include whether the units will associate with many different wireless networks that the photographer visits without them having to re-enter the network’s security parameters. Another question is whether these solutions can work with higher-security WPA2-Enterprise networks, which is of importance with photographers working in most business, government and education setups.

Computer equipment

“New Computing Experience” alive and well in the US market. Market interested in powerful lightweight laptops that are slightly larger than netbooks. These will be driven by processors that are energy-efficient but are powerful. They could become an all-round portable computer that could appeal to college students and the like or simply as a desktop replacement. The machines that I think of most with this market are the Apple Macbook Pro comoputers that are in circulation, the HP Envy series or the smaller VAIO computers.

Nearly all of these computers that are being launched at the show are running Windows 7, which shows that the operating system will gain more traction through the next system-upgrade cycle.

USB 3.0

There has been some more activity on the USB 3.0 SuperSpeed front.

Western Digital had released an external hard disk that works on this standard, which is known as the MyBook 3.0. This my typically be slow as far as peripherals go because of not much integration in to the computer scene. VIA have also shown a USB 3.0 4-port hub as a short-form circuit, but this could lead to USB 3.0 hubs appearing on the market this year.

ASUS and Gigabyte have released motherboards that have USB 3.0 controllers and sockets on board. These may appeal to system builders and independent computer resellers who may want to differentiate their desktop hardware, as well as to “gaming-rig” builders who see USB 3.0 as bragging rights at the next LAN party. None of the laptop OEMs have supplied computers with USB 3.0 yet.

As far as the general-purpose operating systems (Windows, MacOS X, Linux) go, none of them have native USB 3.0 integrated at the moment but this may happen in the next service lifecycle of the major operating systems.

Some more benefits have been revealed including high-speed simultaneous data transfer (which could benefit external hard disks and network adaptors) and increased power efficiency, especially for portable applications.