Showing posts with label communications. Show all posts
Showing posts with label communications. Show all posts

Friday, April 26, 2024

Communications, Networking Methods & Protocols: Introduction and the Information Asset

Terry Pardoe and I wrote an unpublished text titled Data Communications, Networking Methods and Protocols book 20 years ago. Terry passed away on May 2, 2016 at the age of 76. Over this summer I’ll be posting content from that unpublished book here in honor and respect of Terry. It is interesting – 20 years later - a combination of some obsolete but other still relevant technologies. Here’s the first post from the first chapter.

 

The creation and introduction of the binary digital computer into the world of information collection, processing and distribution has brought with it massive expansions in the speed of processing and the breadth of distribution. It has also brought new approaches to connection and an ever increasing need to construct and operate complex, multi vendor networks. Computer systems allow us to make complex information manipulations millions of times faster than by hand and reduce the risk that we make the same mistakes as we always did.

 

Before any attempt is made to analyze the creation and operation of networks ranging in size from ones covering a single household to global coverage we need to understand the evolving role of computers in the past, the present and the future and how our need to deliver computer power and information to a wide range of users has resulted in complex solutions utilizing a broad spectrum of computer types and transmission mechanisms. Such integration has made the use of standardized approaches of paramount importance

 

In this post we'll take a look at how computer systems, and information use,  have evolved into modern approaches and how the world of standards has ensured this transition from the simple to the complex.

 

The Information Asset


The collection, storage and maintenance of timely information over a wide range of types has been implemented over the centuries by a range of written book-keeping techniques that include wall paintings, scrolls, and both hand written ledgers and typed ledgers.

 

Within a corporation different types of information exist in many forms Corporate level information can include financial records, asset lists, customer profiles, product definitions and specifications, trend analyses, competition evaluations and much more. At the department level information can include function definitions, resource availability, staffing lists, technical specifications, schedules and other operational information. In addition, information such as personal schedules, travel support documents, operating procedures, usernames and passwords is typically collected and saved by individuals.

 

A corporation may also acquire and maintain personal and often private and sensitive information about it's employees including social security and tax information, educational background materials and work history. It may also save  information considered to be useful to the corporation from public sources. Trade laws and restrictions in overseas markets, climatic conditions in countries of operation, demographics, maps and travel instructions are all examples of this type of information. Such collection and storage of information has always presented a number of issues to management, the major ones being:


Ownership - Who, within the organization, owns the information and protects and certifies its accuracy.

 

Control - Who controls the information, its collection, it's use by whom, it's modification, also by whom and when, and its final elimination. (It should be noted that ownership and control may be vested in different individuals or organizational units.)

 

Distribution - How is information distributed, to whom, under what conditions, by what technical mechanisms and what controls are in place to prevent it from  being misused or falling in the wrong hands.

 

The key to successful information control lies in the selection or creation and consequent  implementation of a company wide suite of information standards. Many examples of such standards exist and have evolved over the ages addressing such issues as:


·      The infrastructure needed to create, maintain and use stored information resources.

·      The financial cost of creation, maintenance, protection and final elimination of all forms of information.

·      All machine (if used) and  human factors

·      Measures taken to eliminate the impact of all disasters, natural or manmade.

 

The goal with all collected and distributed information, whether it be stored as paintings on cave walls or detailed writings in ledgers, has always been to meet the objectives of what the authors have defined as the Information Bill of Rights.

  • The right information
  • To the right person or process
  • At the right time
  • In the right place
  • In the right form and format
  • At the right price

Wednesday, April 24, 2024

Spatial Diversity In Wireless Communications

Spatial diversity is one of those fundamental technologies used in wireless communications
(cellular networks, Wi-Fi, satellite communications, and broadcasting) that does not get much exposure. The technology is used to combat fading and improve signal quality, enabling reliable communication links, especially in challenging environments characterized by obstacles, interference, or long propagation distances. Let’s take an introductory look. 

Spatial diversity exploits the spatial dimension of wireless channels by deploying multiple antennas at either the transmitter or receiver, or both. By leveraging spatial separation between antennas, spatial diversity techniques minimize the effects of fading, which result from signal attenuation, reflections, and scattering in multipath propagation environments. Through the simultaneous reception of multiple independent copies of a transmitted signal, spatial diversity enhances the likelihood of receiving at least one strong signal, thus improving the overall reliability of communication links.

 

There are three key methods involved - Selection Diversity, Maximal Ratio  Combining (MRC) and Equal Gain Combining (EGC).

 

Selection Diversity: In selection diversity, multiple antennas are strategically placed to receive the same signal, and the antenna with the highest received signal strength is chosen for further processing. This technique is relatively simple to implement and offers improved diversity gain, particularly in scenarios with moderate to severe fading.

 

Maximal Ratio Combining (MRC): MRC combines signals from multiple antennas with different complex weights, determined based on the channel conditions. By weighting each received signal based on its signal-to-noise ratio (SNR) and combining them coherently, MRC maximizes the received signal power, thereby enhancing the overall signal quality and reliability.

 

Equal Gain Combining (EGC): EGC employs a simpler approach by combining signals from multiple antennas with equal weights. While less complex than MRC, EGC provides diversity gain by mitigating the impact of fading through signal averaging.

 

Spatial diversity offers an effective mechanism to combat fading and enhance signal reliability. Through the strategic deployment of multiple antennas and the application of diverse combining techniques, the technology improves data transmission across a wide range of environments and applications.

Monday, April 15, 2024

Lost Text and Lost Friend: Terry Pardoe and Data Communications, Networking Methods and Protocols

 

In 2003-2004, I collaborated with Terry Pardoe, co-authoring a Network Security book published in 2004. Inspired by its success, in 2005 we began work on another book titled Data Communications, Networking Methods and Protocols, which unfortunately never made it to publication. Fast forward to September 2014, where I had the honor of delivering the opening keynote for the fall semester at New Hampshire Community Technical College (NHCTC) in Nashua. Terry played a pivotal role in making this happen, and during the event, we had the chance to capture the photo here together, proudly holding our first co-authored text.

I first crossed paths with Terry back in 1999 when he joined NHCTC-Nashua as a part-time lecturer and became a subject matter expert in the (sunsetted in 2016) Verizon NextStep program. Despite a rocky start, our relationship quickly blossomed into a close friendship. Terry possessed a remarkable sense of humor, though I can't recall ever seeing him laugh. He sure knew how to make me laugh though. He resided in Nashua, New Hampshire, alongside his wife and family. A few years ago I learned Terry passed away on May 2, 2016 at the age of 76. Years later and I’m just finding out – it happens to us all - people we work with and are friends with – we lose touch when things change. Before we get into the content – here’s a little bit about Terry.

 

Terry was born in the United Kingdom and educated at the Birmingham College of Advanced Technology (Now Aston University). After coming to the states, Terry D. Pardoe was executive vice president of International Management Services Inc. a USA based computer application and training organization for 23 years (until Aug 1999). On his death, he had more than 40 years experience in the design and application of networks, communications and information systems. He was an internationally recognized expert on all aspects of telecommunications and networking including wide and local area networks, TCP/IP based networks, the Internet, intranets, client server computing, data and network security and many other applied areas. He lectured and consulted on a worldwide basis for a wide range of clients including: Digital Equipment Corp., AT&T, Sprint United, Verizon, Citibank, IBM, Honeywell, NT&T (H.K.), SCI (Brazil), etc. Terry worked with all the major agencies of the US Government including NASA, NSA, DISA, US Navy, US Army, IRS and many others.

 

Terry was the author or co-author of over 200 technical texts on computer applications, management techniques and data communications including text to support the first Java seminar available on a worldwide basis. He authored many www pages which include complex graphics, Java applets and JavaScript.

 

Today I found an old CD-ROM with all text, images, etc intact of the Data Communications, Networking Methods and Protocols book. Over the summer I’ll be posting content from that unpublished book here in honor and respect of Terry. It is interesting – 20 years later - a combination of some obsolete but other still relevant technologies.

 

An amazing man and an amazing career, building the foundation for the Internet we have today. Thanks Terry!!


Sunday, October 28, 2018

FCC Proposed New 6 GHz Wifi Spectrum

On October 2, the FCC proposed WiFi access to the 6 GHz region (5.925-7.125 GHz) in addition to the currently accessible 2.4 GHz and 5 GHz bands of frequencies. 
Currently most WiFi access points operate at either one of those 2.4 GHz of 5 GHz bands. Problems arise as more and more devices are connecting via WiFi. Due to longer wavelengths, 2.4 GHz band signals travel further but with the growing plethora of wireless devices, often suffer from congestion and interference. The 5 GHz band typically operates at higher speeds but does not travel as far due to the shorter wavelengths. 
Opening up the 6 GHz region will provide close to three times what is available in the 2.4 and 5 GHz regions - great for locations where lots of people are connecting at the same time (think college campuses, airport terminals, etc). 
The 6 Ghz frequency region is currently used for point-to-point microwave links and earth-to-space communications along with other data links and there will likely be some opposition. There is a current FCC public commenting period and there will be another vote once the commenting period is over. For details you can read the full FCC Notice of Proposed Rulemaking for ET Docket No. 18-295; GN Docket No. 17-183 linked here.

Thursday, December 18, 2014

Closing the loop with IP/Optical Integration

I've spent the last 17 years focused on Internet Protocol (IP) over various transport systems - wired (copper), wireless and optical. With the explosion of video, social media and other bandwidth hungry applications we've seen fiber moving closer and closer to the end user. Wireless is the perfect example with towers back-hauled into the network by fiber. It's really just the last mile/final connection that is typically not optical fiber based for most of us.

We're seeing IP/optical integration today really ramping with these things called software defined networks (SDNs). I wrote a post defining and describing SDN's last month titled SDN: When The Hardware Becomes A Little More Soft

With the move to all-IP, SDN and cloud services, many service providers are now integrating IP routing and transport. In this short 4 minute and 50 audio clip, Arnold Jansen discusses how IP/optical control integration can help operators simplify and streamline their operations and drive better cost synergies.



 Smart, fast, efficient. Good stuff.

Thursday, November 6, 2014

SDN: When The Hardware Becomes A Little More Soft

I grew up in the dedicated hardware world. Switches and routers that – sure - included processors and a little bit of memory.  Devices with pretty basic operating systems that kept track of addresses to move content around on a network, making sure stuff gets to where it is supposed to go. Nothing fancy but it has worked pretty good with the build out of the internet over the past 20 years or so. 

Today, we’re seeing a pretty major shift to what people are calling Software Defined Networks (SDNs). You may have seen SDN also referred to as elastic computing and/or elastic networks. The idea with SDNs is to not just try and make the network more efficient but also make it flexible and scalable. The concept is pretty simple and SDN Central explains it pretty well:
Software Defined Networking (SDN) is a new approach to designing, building and managing networks. The basic concept is that SDN separates the network’s control (brains) and forwarding (muscle) planes to make it easier to optimize each. 
In this environment, a Controller acts as the “brains,” providing an abstract, centralized view of the overall network. Through the Controller, network administrators can quickly and easily make and push out decisions on how the underlying systems (switches, routers) of the forwarding plane will handle the traffic.
So, you’ve got a smart controller looking at the entire network including applications running on the end devices. The controller communicates with network controlling devices (switches and routers), adjusting and optimizing the network to real-time conditions. Sort of like a maître d / head waiter in a busy restaurant.

For providers (Verizon, AT&T, etc) , SDNs reduce equipment costs and allow the networks to be more efficiently controlled. These networks are optical fiber-based and that has me pretty excited with my new position at the NSF-funded OP-TEC ATE Center

Centralized, programmable optical networks that dynamically adjust to changing requirements. Nice. I’ll be writing more about SDN and a number of other optics based technologies in future posts.

Monday, July 7, 2014

What To Do When You Get a SPAM Text Message

I've been getting these daily it seems. The Federal Trade Commission has a set of guidelines you can use. Here's FTC recommendations on what to do when you get a spam text message:
  • Delete any texts asking you to confirm or provide personal information. Legitimate companies don’t ask for information like account numbers or passwords by text or email.
  • Don’t reply, and don’t click on links provided in the message. Links can install malware and take you to spoof sites that look real but whose purpose is to steal your information.
  • Don’t give out any personal information in response to a text. A spammer wants access to your Social Security number, credit card numbers, and bank and utility account numbers to open new accounts in your name.  
  • Report spam texts to your carrier. AT&T, T-Mobile, Verizon, Sprint or Bell subscribers can copy the original text and forward it to 7726 (SPAM), free of charge.
  • Review your cell phone bill for unauthorized charges.Report them to your carrier.

Monday, March 24, 2014

Storage Tiering

This is another topic I’ve been reading a lot about lately.  Storage tiering uses expensive faster access drives for frequently used data and slower less expensive  access drives for older archive type data. 

Typical fastest level tiers in a data center will use an optically connected fiber channel disk array, followed by Small Computer System Interface (SCSI) attached drives, followed by Serial Advanced Technology Attachment (SATA) drives followed sometime even by tape drives. Tape drives – I know – but yes they are still used - typically to take content completely offline and store.


Mechanical drives have been historically used for the fastest tier but as prices drop and operating systems include better support , we’re seeing a lot of much faster solid state memory devices (solid-state drives (SSDs) and I/O accelerator cards (sometimes referred to as solid-state accelerators [SSAs]) used for the faster level  tiers now.

What’s the difference between a SSD and an SSA? They both basically do the same thing – the only difference is the data interface. 
  • SSD’s look like a mechanical hard drive and the server operating system uses standard BIOS calls to access. 
  • SSA’s are a little different and use a PCI Express (PCIe) interfaceThe operating system must use a unique set of software drivers specific to the SSA device being used. 
Because SSA’s use drivers that have been tuned specific to the device, they tend to be a little faster. Both SSD and SSA devices can work together on the same server.

Saturday, March 15, 2014

Calculating Wavelength If Frequency Is Known

I get this question a lot. It’s not exactly phrased this way though. Typically it’s along the lines of “What’s the wavelength of the WiFi signals in my home or office?

Good question and a pretty simple calculation! I do realize with a quick Google search you can look the value up but….. that takes the fun out of it J

First, let’s define wavelength. Electromagnetic radiation is sinusoidal in nature and wavelength, represented by the Greek letter lambda (λ), is a distance measurement usually expressed in meters. Wavelength is defined as the distance in meters of one sinusoidal cycle as illustrated in the figure below.


Most WiFi signals run at around 2.4 Giga Hertz (GHz) or 2.4 Billion cycles per second!

Now, in you home or office, you’ve likely got a lot of other wireless devices (microwave, ovens, cordless phones, baby monitors, etc) operating in this same 2.4 GHz frequency range. In the WiFi world, the 2.4 GHz WiFi signal range is divided into 11 channels and channels can be selected when setting up a wireless network to avoid other devices transmitting in the same frequency range.

Ok – back to our question – what’s the wavelength? Here’s how we do the calculation:
12.5 cm is approximately 4.92 inches and...... that's your wavelength.


Monday, March 10, 2014

Cloud Computing Closer Look - Infrastructure as a Service (Iaas)

Let’s take a quick closer look at cloud computing today starting with Infrastructure as a Service (IaaS). IaaS is one of the three main categories of cloud computing services. The other two are Software as a Service (SaaS) and Platform as a Service (PaaS) – we’ll cover the last two in later posts.

So, basically an organization (larger or small) outsources equipment (hardware) that can include servers, routers, switches, storage, backup, etc. The service provider handles all of the maintenance, updating, connectivity, etc and the client pays on a per-use basis. Some of the common IaaS components include:
  • Billing.
  • Automation of administrative tasks.
  • Dynamic scaling.
  • Desktop virtualization.
  • Policy-based services.
  • Internet connectivity.
IaaS is a cost effective option, especially for small companies that do not want to invest directly in hardware and staff to maintain it. That’s why it is sometimes (and perhaps more accurately) referred to as Hardware as a Service (HaaS).

Who are the big IaaS service providers? Today it’s Amazon, Google and Microsoft. Security has always been a concern when it comes to cloud-based processes and there are a number of smaller enterprise level companies involved including Adallom, Alert Logic, FireBlade, FortyCloud, HyTrust, Imperva, JumpCloud, and Porticor.

Wednesday, March 5, 2014

The Rise Of The HetNet

I’m starting to see the term HetNet used in my reading and even had a student ask me for details this morning. That said – I figured it would make a good blog post.

HetNet is short for Heterogeneous Network and is a term currently being used in the wireless world. Most of us are carrying around smartphones with a number of different antennas built in for access via different network technologies. The neat thing about HetNets is they are able to maintain mobile connectivity (no dropped connections) when switching between different wireless connection technologies. 

The three different connection technologies getting all the HetNet buzz right now are LTE, Carrier WiFi, and enterprise femtocells. LTE is 4G cellular service and Carrier WiFi is just WiFi service provided by a wireless carrier. Femtocells are small cell devices that are connected to an Internet broadband connection. 

So HetNets allow a user device to seamlessly switch from network type to network type– LTE to WiFi to femtocell and vice-versa back and forth without dropping a connection. Pretty neat.

Now, not too long ago, it was believed LTE would be the dominant mobile technology and there would not be a need to alternative type technologies like Carrier WiFi and femotocells. But think about it…… there is only a limited amount of spectrum and bandwidth so providers are looking for ways to lower the number of devices per cell. There are also advantages to having users as close as possible to the different types of base stations. 

As a result, we’re seeing providers like Verizon Wireless and AT&T use HetNets to improve the coverage of their network, increase network capacity to match user demand. enhance the user experience, and lower the cost of delivering mobile broadband services.

Tuesday, December 3, 2013

Online Tracking, Consumer Profiling, Data Collection and You

Well - it's the holidays when we're using the web along with those credit cards a lot more frequently. Ever wondered who's watching you online?  And who the heck you are giving your personal card info to when making online purchases? Ever also wondered if there was anything you could do to protect yourself a little more? Well, others have too.

Abine, a Massachusetts company spun out of MIT in 2008, has developed some pretty nice tools that allow web users more control over their personal data. These accessible tools allow you to choose when you want to share your information, control your personal data, and provide the ability to protect your online privacy. Before we get to the products - here's some interesting tidbits from an Abine fact sheet:

Online tracking, consumer profiling, and data collection are happening wherever consumers go on the web, usually without their knowledge or approval. Consumers are the product being sold. Social networks, ad networks, and e-commerce sites collect every last byte of personal information they can, combining consumers’ online activity with their offline lives. The consequences of all this data collection are growing and real: lost job opportunities, higher prices, more spam, lower credit scores, identity theft, and more. Let's look at some tracking info and stats:
A tracker is a connection that your browser makes when it loads a webpage that’s intended to record, profile, or share your online activity. Usually these connections are made to entirely different companies than the website you’re actually visiting. The most common types of trackers are:
  • Javascript: 43% 
  • Images, such as 1-pixels: 14% 
  • iFrames: 14% 
  • Flash cookies: 5% 
Abine collaborates with the UC Berkeley Center for Law and Technology on a recurring Web Privacy Census. The most recent Census found:
  • The use of third-party tracking cookies on the 100 most popular websites increased by 11% from May to October 2012. 
If present trends continue, the amount of online tracking will double on about 2.5 years. 
  • Google has a presence on 712 of the top 1,000 websites 
  • 26.3% of what your browser does when you load a website is respond to requests for your personal information, leaving the remaining 73.7% for things you actually want your browser doing, like loading videos, articles, and photos.
  • Google makes 20.28% of all tracking requests on the web 
  • Facebook makes 18.84% of all tracking requests on the web 
5% of the top 1,000 websites use social networking code that can match users’ online identities with their web browsing activities, and nearly 25% of the web’s 70 most popular sites shared personal data, like name and email address, with third-party companies (Wall Street Journal, 12/2012).
So... how do you protect yourself?
Abine has just rolled out DoNotTrackMe 3.0, a browser extension that stops online trackers from finding your contact and credit card info.  Here's a DoNotTrackMe sample screen shot.


In addition, the company is giving out unlimited Masked Cards through December 26. The Masked Cards work with any credit or debit cards you have, allowing you to create disposable credit card numbers for each online purchase you make, preventing having to give out your real card info. 

The company also makes a product called MaskMe which keeps you private as you browse and shop the web, and creates and manages secure passwords and DeleteMe which removes your public profile, contact and personal info, and photos of you from leading data sites. 

Cool stuff. Check them all out.

Friday, September 20, 2013

A Family Without A Phone

I probably should be writing something about iOS7 but.... just a minute..... I gave this assignment the first week in a telecom class I'm teaching this semester. The short student essays (I know, not really technically an essay at 200 words) have just blown me away. It's so different today compared to growing up in the 60/70's. Here's what I asked them to do:
Growing up I had a friend who’s family did not have a telephone. His Mom used to whistle (really distinctively and loudly) when she wanted him to come home. When he was over our house or we were out in the woods playing we were all tuned in, listening for her whistle. Everyone knew what it meant and she was good - to this day I’ve never heard anyone who could whistle like her. 
Times have certainly changed. I’ve had almost instant contact with my two children with text and voice over the past ten years. Most recently we’ve all got smart phones and we’ve been able to add email and social media (Facebook, Twitter, etc) to our mobile communications tool list along with video applications like Skype and FaceTime. Although some may disagree, the ability to connect or be connected with them no matter where they are in the world has a level of assurance I know my friend’s whistling Mom did not have 45-50 years ago. 
This week, prepare a 200 word (plus or minus 10 words) essay describing how mobile technology has impacted your life.
My friend's family did not have a television either!

Tuesday, September 10, 2013

FCC Connect America Fund Phase I Round Two

Last week, the Federal Communications Commission (FCC) posted an interactive map (embedded below) showing the locations where new higher-speed broadband may be deployed as the result of the second round of Connect America Phase 1 funding.

Back in 2011, the FCC launched the Connect America Fund (CAF) and it has had limited success. Round one of funding only dispensed $115 million of $300 million in available funds. I'm not sure why the FCC has had difficulty giving this money out - currently the FCC defines broadband as 768 Kbps downstream and 200 Kbps upstream. In this next round the FCC has decided to offer two levels of subsidy in the current round - $775 per location to bring broadband into underserved locations (where broadband does not exist) and an additional $550 per location (where lower speed broadband does exist) to bring broadband speeds up to 3Mbps downstream and 768 Kbps upstream.

Coverage includes over 600,000 homes and businesses in the United States and the map shows the number of homes and businesses along with the amount of subsidy ($775 or $550) for each location.


Four rural telcos are receiving most of the funds:

CenturyLink - $54 million
Frontier Communications - $72 million
AT&T - $100 million
Windstream - $124 million

Interesting that Verizon Landline (with regional sell-offs over past few years) does not appear to be a rural player any more.

Thursday, September 5, 2013

Verizon Trimming Some Wireline Limbs

I've been teaching Verizon technicians in a program called NextStep since the mid 1990's. The Next Step Program allows contract qualified Verizon associates who are members of the Communications Workers of America (CWA) or the International Brotherhood of Electrical Workers (IBEW) to earn an Associate in Applied Science degree in Telecommunications Technology from a participating college. It's been a great opportunity for everyone involved to keep up and learn as the industry has transitioned.

This morning I taught my first class of the fall semester and we had some interesting discussion on where copper based landline services like DSL are going. The other night on Jim Cramer's show, Verizon CEO Lowell McAdam opened up a bit on the companies plans. Here's some back and forth from the show posted at  Stop the Cap!:

Jm Cramer, CNBC: “[Under former Verizon CEO Ivan Seidenberg, Verizon] took areas that really weren’t growth areas and sold them to Frontier and other players. Would you be able to get rid of some of your underperforming landline businesses to be able to increase [Verizon's] growth even further?”

Lowell McAdam, Verizon
: “That is a possibility. [...] If you talk about opportunities here, now that we have One Verizon, [...] we are going to trim some limbs around the tree here. Things that aren’t performing will not be a part of our portfolio so we can invest in things that will drive the kind of growth we are excited to be able to tap here.”
In New Jersey and New York, Verizon is moving on a wireless landline replacement called Voice Link. It's optional for some customers but many are thinking it will replace copper services in there is approval from the states regulators. Verizon is calling Voice Link an improvement for voice customers dealing with repeated service calls.

Bloomberg estimates the Verizon wireless net worth is around $289 billion while Verizon wireline (landlines, FiOS and business broadband) is worth just $24 billion. Looking at revenue, Bloomberg says Verizon wireline totaled $39.8 billion last year which is down from $50.3 billion in 2007. During the same period, Verizon wireless revenue was up 73% to $75.9 billion.

It's pretty clear where this is all going - at least when it comes to Verizon wireline.

You can read a transcript of the complete McAdam interview linked here.

Wednesday, September 4, 2013

Crowdfunding a Super-Smartphone

Well..... it's been a while since I posted here. I like to think I took a little sabbatical for the past four months. Most of my summer was spent on the road so it feels pretty good to be back at home for at least a little while. Even though I was not posting here I was still keeping up with technology and the business of technology.

Today I wanted to write a bit about a company called Canonical that's run by Mark Shuttleworth. You may not have heard of Mark or Canonical but you probably have heard of a version of the Linux operating system called Ubuntu that Canonical makes. Ubuntu is used on millions of servers around the world - basically big high horsepower computers used to host websites, etc.

Mark has this idea to launch what many call a super-smartphone - basically a tablet computer that has all the functionality of a PC called the Ubuntu Edge.  Now, Mark happens to be a billionaire but decided back in July he wanted to crowdfund the project to the tune on $32 million using the crowdfunding website Indiegogo. Well long story short, Mark failed - at least with the crowdfunding idea. Canonical raised a little under $13 million ($12,813,501 to be exact) of the $32 million Mark was looking for.

The phone that was spec'd sounded pretty nice - a multi-core processor (fastest on the market), at least 4GB of RAM, 128 GB of storage, a sapphire crystal screen (only a diamond can scratch it), a high capacity silicon anode battery, GPS, gyro, accelerometer, proximity sensor, compass, barometer, HDMI interface for TVs and monitors, dual-LTE, dual band 802.11n WiFi, Bluetooth 4, and near field communications.

I found Mark's crowdfunding approach interesting because with Indiegogo there are two options - an all or nothing approach (that's the one Mark picked) or the second option where the company keeps everything pledged whether the stated goal is met or not.

Why did it fail? Mark may have been asking for too much. Donors that wanted to get one of the first phones made were required to pledge at least $725. Initially the campaign set crowdfunding speed records but in the end stalled once the buzz wore off.

Is it over? For Canonical it may be for now. Mark has said he will not use his own funds for the project. But Mark is not the only one with  super-smartphone desires - on July 16 (when I was in Poland right next door) Alexey Miller, chief executive officer of a Russian natural gas exporter called Gazprom offered to pay $3.7 million to anyone who could come up with one.

Saturday, January 19, 2013

Goodbye SMS-Based Text Messaging

ASYMCO put up an interesting piece titled What's up with text messaging? yesterday about texting in Spain. Volume is dropping rapidly with Internet Protocol (IP) based message apps like Whatsapp, Apple's iMessage and Facebook messaging replacing a voice network based text protocol called Short Message Service (SMS). SMS has been around since 1982 and has become a real cash cow for wireless providers. 


Here's more from that ASYMCO post:
  • Whatsapp reported that it set a record of 18 billion messages processed over New Year’s Eve. 
  • In October Apple announced that iMessage had delivered 300 billion messages during the preceding 12 months.
  • Globally SMS traffic is still rising. It’s expected to reach 9.6 trillion in 2012, but at least one analyst forecasts  that SMS’s share of global mobile messaging traffic will fall from 64% in 2011, to 42% in 2016.
I'd also put Skype on the list as a disruptor.

Expect similar results in the United States and other countries. Wireless providers have seen this coming for a while now and (I believe) it's the reason we've seen most implement data caps while, at the same time, encouraging customers to consume more data (translation - go over your data cap) using services like mobile video streaming. 

If you want to know more about SMS and IP based texting I've got an earlier posted titled Why Are My iPhone Text Messages Sometimes Blue and Sometimes Green? linked here.