• Zum Inhalt springen
  • Zur Seitenspalte springen

Technik News

Das Blog zu IT, Mobilfunk & Internet

TechCrunch needs a new Wiki – the old one burned up!

Juli 21, 2006 von Harald Puhl

It was frustrating to see the TechCrunch Wiki continuously locked out by people signing up to Mike Arrington’s TechCrunch party #7, so it seems that in the 20 minutes I managed to be offline, it has been locked completely, and people have turned to RSVPing on the blog’s comments. I trust this proves a Wiki is not the best method to sort an RSVP list – RSVPr.com anyone?

I hope my entry on the blog, #115, makes it to the final list! Looking back at past events, it will be a blast. Oh, and that guy that kept locking the Wiki for 15 minutes, then again, and again, and again….I have your IP… (just kidding!)

This time around the party will be at August Capital in Menlo Park – plenty of space to schmooze and talk about or projects.

2.0 – The Bubble Reloaded

Juli 18, 2006 von Harald Puhl

It’s coming back, but this time, it’s a 2.0 bubble. We will not likely see hundreds of millions of dollars burning in botomless pits, as VCs are being more rational about their release of funds, but no doubt a good many companies jumping on the bandwagon will not survive.

Take social networks – there are a myriad of them appearing, each an even more boring copy of the preceeding one (whoa, preceeding has two e’s, let’s grab the 2.0 domain quick!). It looks like anything with two vowels in line can be The Next Big Thing. Andrew Wooldridge has created a very handy Web Two Point Oh! name and product generator for your shiny new company – endless fun. Want a 2.0 bullshit generator? Go here. The tools are available, the VCs are waiting with the cash, what are we all waiting for?

I read a few weeks ago an article that defined this bubble as more controlled, in the sense that investments are made after the business model is somewhat proven, so the old “lets get 100.000 users and figure out how to make money later” is definitely out. Here is a great list of 11 suggestions to survive the 2.0 bubble – sobering read.

My opinion is that bubbles are necessary evolutionary process, they sort out the weed from the golden nuggets. The 3.0 bubble will be way bigger than this one – why? Because the 2.0 bubble will be more of a pop, with dozens of $10 million investments going down the drain, thus VCs will say “hey, the last bubble wasn’t that bad, we can risk more money this time”. History has proven that history always repeats itself.

How can FON expect to win?

Juli 12, 2006 von Harald Puhl

Today I decided to attempt a second round at configuring the router FON sent me a few days ago, since my first out-of-the-box experience hadn’t been that good. Emails to tech support unanswered, which seems to be an endemic problem, as can be seen on FON’s forums, I finally gave up.

After plugging in the WRT54GS router as briefly described in the brief manual supplied with it (a third of one side of an A4 sheet of paper), I connect to the FON_HotSpot SSID detected by the MacBook. Fire up Firefox, and I’m promptly greeted with a welcome page that states the router could not configure itself, and thus has no connection to the Internet. It shows a few scenarios that one can check for problems, also suggesting one should consult again the third-of-a-page-handbook, and, failing all this, to try manual configuration of the router.

After about an hour of changing IP addresses of the WAN and LAN interfaces (and where is the WiFi interface? or is it linked to the LAN or WAN?), I have finally given up again. I’m not a networking überguru, but I know a bit about routing and setting up IP interfaces, and this thing just managed to get on my nerves. You cannot find a clear manual with diagrams of network connectivity, setups and scenarios, a description of the theory of operation of the hotspot, and as it has been shown, sending emails to FON support is usually futile. The forums are more helpful, but not because there is a healthy bunch of FON staff there, but because a number of talented and skilled individuals have taken upon themselves the task of helping others through the ordeal.

I’m sure that a lot, if not most, users that plug in the FON router can simply connect to it, register and start surfing, but in cases like mine, where I simply have a DSL router to which I plug in the FON router and it’s supposed to work – but doesn’t – a blank void is all there is left to stare at.

Maybe a last attempt will be to flash the new release of the firmware, once they have fixed the problems in v.0.6.6.

Bottom line is that FON cannot expect to create a WiFi planet with people roaming for free on the 1 million routers they are going to distribute, once they get their logistics right, based on complex hardware that requires from either skilled operators, or very good tech support and clear setup and troubleshooting guides. A couple of days ago, someone posted on the forum that FON was a beta company. How can a company class itself in beta? It can have a service in beta, but the company must be running, if not totally smooth, at least with agility and responsiveness, fixing its problems quickly and providing first-class customer service.

The reason why WiFi USB adapters suck

Juli 9, 2006 von Franz Hieber

People use USB WiFi adapters for a number of reasons, maybe their laptop doesn’t have built-in WiFi, or like me, there are no cards yet available that fit the tiny pseudo-PCMCIA slot of the MacBook Pro. Yes, I know the MBP has built-in WiFi, but my personal interest and professional activity involve using WiFi in alternative ways, so I need to test antennas, adapters, software and so on.

A few weeks ago, I bought a D-Link DWL-G122, the thought being that since it could be connected to a long USB extension cable, there wouldn’t be any of the RF losses associated to coaxial cables – and so I could go wardriving with a potentially better setup than the usual PCMCIA card with a pigtail and coax running to a roof-mount antenna. And I was wrong. The results were appaling – even the Vaio’s internal IPW2200 card was much better, detecting over twice as many access points as with the D-Link.

How could this be? Logically, having the antenna attached directly to the RF port of the WiFi adapter should reduce loss considerably – but it wasn’t the case. To be sure, I went shopping again, and this time bought a Conceptronic C54RU. One would think that the D-Link, costing around 39$, would have better performance, since the Conceptronic only cost me 25$ – there just had to be something there to justify the price difference. To my surprise, performance was almost identical. This prompted me to pry open the two adapters, and this is what I found:

181730312_9f9b647046
No, I didn’t just photoshop a clone of the first PCB. It is the same PCB for both adapters – which means that some OEM/ODM company is manufacturing these devices, and selling them in customized plastics to whoever wants them. Paying attention to quality? Probably not their very first priority.

The next two photographs show a little explanation on the structure of the RF section of these adapters. Do not confuse the PCB antenna as a diversity arrangement, it is basically a center-fed dipole. The designer paid no attention to the large mass of grounding material right next to the large pads of the antenna, and the matching circuit could probably not do much to alleviate the poor design. Here is the actual stripline [click the image for a larger version]:

181730309_4ffed07273

And the test connector:

181730313_8376d519b7

Bottom line: if you are close to your access point, and don’t really care about the range and quality of the link, this may be the adapter for you. But, if your intention is to take these devices for a wardrive, well, don’t.

Unix Course: The Shell, and Shell Programming – Lecture 2

Juli 3, 2006 von Franz Hieber

The inside of Athena Unix

Today we will continue discussing the shell.  We will start by covering the differences between the different shells which are available.

There are 4 shells available on the various Athena machines:

. sh    . csh      . ncsh     . tsh

Actually, when you run csh on Athena, you are really running ncsh. The major difference between the two is that ncsh allows you to use command completion (esc) to complete program names or file names. In the rest of this lecture, when I refer to csh, I am really talking about both csh and ncsh.

sh is the „standard“ shell used under UNIX (but not Athena UNIX).  You will often hear it refered to as the bourne shell.  The bourn shell does pretty much what you would expect a shell to do.  You will find that most shell scripts are written in using the bourne shell. 

csh is the shell that most of you probably use if your use of UNIX is on Athena. We discussed some of the builtin commands for that shell.  Of course, you can also issue the usuall UNIX commands (which are actually programs) from the c-shell too (just as you can from the bourne shell).  Let me list some of the differences between the c shell and the bourne shell.

. history

The c shell has a history mechanism.  If you set the history variable to a number, it will remember that number of previous commands, and you can use the history to reissue the commands, even make changes to them before reisuing them, or fixing mistakes.  Another difference brought about by the use of ! for history is that if you really want to use an ! in the command line, it has to be quoted.   

. use of ~

The c shell allows you to specify a users directory as ~user.  The ~user is actually expanded by the shell to the full path of his/her login directory. The c shell reads .login when you log in instead of the file .profile which is ready by the bourne shell.  Similarly, the shell init file is .cshrc instead of .shrc.

. alias

Last I mentioned how the alias command could be used to declare a synonym for another command (or sequence of commands).  It too is one of the differences between the c shell and the bourne shell.

 TSH

The last shell I mentioned was the t shell.  tsh is similar to ncsh except it has a few (more) added features.  One of the added features is an emacs like history mechanism.  To edit previous commands emacs editing commands can be used.  I don’t think that tsh is available on any of the Athena machines except Charon. Use the man command to find out more about each of the shells I mentioned.

Environments and Variables

There are two commands in the c shell that can be used to set variables.  They are

set and setenv

set is relatively straight forward.  You can set the value of a variable to be a string.  These variables can then be used later in the shell by preceeding its name by $.  For example, if I said

set var1 /mit/b/c/bcn/file1

I could later edit that file by saying

emacs $var1

Some variables are used by the shell itself.  For example, the value of the „history“ variable specifies how many lines of history are to be kept.  A few other variables used by the shell are

notify = immediatly tell of changes in process states
noglob =
time   = if a command user more than time cpu seconds, it gives stats on usage upon completion
prompt = your prompt

It is important to note that the values of the variables set by the set command are not available to programs which you run under the shell.  In order to have the values visible to the programs you run it is necessary to use the setenv command.  When a variable is set using the setenv command, its name and value is added to a string (usually quite long) which is automatically available to programs running under the shell.

A few useful variables in your environment are:

HOME
EDITOR
TERM
PRINTER
ROGUEOPTS

Variables can be unset using the unset and unsetenv commands.  You environment can be seen using the printenv command.
History

As I mentioned before, the c shell provides a history mechanism whereby you can repeat previous commands, and or change them or correct them and then reissue them.  The variable „history“ should be set to the number of lines of history that you wish the shell to maintain. 

The command „history“ will list those commands that are remembered. In order to reuse a command, the shell uses the „!“ character.  By far the simples form of this is the „!!“ command which is replaced by the last command.

!word is replaced by the last command line beginning with that word.
!number is replaced by the command line whose number (listed by
 history) is number.
!$ is replaced by the last word of the previous command

There are many more commands which can be used to modify previous commands.  For instance,  !mv:s/foo/bar/ will find the line beginning with mv, and it will replace foo by bar, and then execute the command. I refer you to the c shell manual page for more commands.

.history file

If you have a .history file, the shell will remember your previous commands between logins.  In other words, you can log out, and back in, and it will remember the command you typed in you previous login session.

I should also mention here that the command editing in the t shell uses emacs like editor commands.

Process Control

How is it that the shell runs other programs.  A little background is in order first. Under UNIX, the only way to create a new process is with the „fork“ system call.  What the fork system call does is it creates a new process which is a copy of the current process.

Another uaseful system call is the „execute“ system call.  The execute system call takes as arguments a filename, and a list of arguments. It then replaces the current program with the contents of the filename specified as the program, passing it the arguments which were specified. 

When a shell wants to run a new process, the fist thing it does is it tries to open the standard output and standard input if either has been redirected.  It then forks.  Each fork then checks to determine if it was the parent process or the child.  The parent process then waits for the child to finish (or for the user to type ^Z), while the child uses the execute system call to replace itself with the desired program.

Pipes-

When a sequence of programs are specified in a pipeline, the shell starts the first process as described above.  For the standard output, it opens pipe pretty much as it would open a file.  The process created by fork then has access to the pipe as the standard output. The next thing the shell does is it changes the descriptor for the pipe from the standard output (file 2) to the standard input (file 1), and starts the second program in the pipe as it would do so normally. Becuase of the way open files are passed to child processes, the standard input for the second program is in fact, the same file descriptor (or pipe) as the standard output to the first program.

Expending this mechanism to a three program pipeline should be failry straightforward.

Stoping and starting programs-

The shell keeps track of those processes which are running under it. The jobs command can be used to list them.  The shell commands stop, fg, bg, and a few other commands can be used to start and stop these processes.  bg tells the shell to start a child process in the background. Background processes are unable to read from the terminal, but they can write to it.  The fg command tells the shell to run the process in foreground.  A foreground process (often considered the current process) has control of the terminal.  Hence, when a process is running in forground, the shell waits for it to finish before returning you to the shell.

  • Unix Course: Introduction, Shell Commands – Lecture 1
  • Unix Course: The Shell, and Shell Programming – Lecture 2
  • Unix Course: More Shell Programming – Lecture 3
  • Unix Course: Unix Security – Lecture 4

No A2DP in OSX – maybe if Apple made a Bluetooth stereo headset…

Juli 2, 2006 von Harald Puhl

Last night I was watching a DVD on my MacBook Pro, and remembered that I still kept a Motorola Bluetooth stereo headset from the time I was working at SouthWing and we designed such devices.

Bluetooth stereo headsets use a profile called Advanced Audio Distribution Profile (A2DP), which allows them to receive medium-quality audio at 16kHz from compatible devices. Most USB Bluetooth dongles sold recently have the profile in their drivers, and there are some mobile phones from Nokia, Samsung and Motorola that also feature this profile. The advantage is that you can listen to music wirelessly, and also control the player from the headset, as they feature the usual forward, back, play and pause controls.

Once I found the headset, I switched on Bluetooth on the Mac, and started the pairing process. The headset was recognised just fine, and pairing completed, but I noticed that it had been connected as a Handsfree device, with A2DP nowhere to be found. Since there doesn’t seem to be a method of connecting the headset permanently, so the audio is always routed from the Mac to it, the attempt was frustrated – I couldn’t even listen to the DVD in low-quality audio.

Why has Apple left out this profile, is it a blunder, or a calculated approach? As to this date, Apple doesn’t manufacture or resell any Bluetooth wireless headsets (only one can be found at their store, and it comes with a dongle for the iPod, so it doesn’t count). So, why would they have an interest in adding the A2DP profile, so that we could use any other headset? If they are in the process of designing their own, they might want to keep the profile away from Macs until they launch it.

Then again, if we give Apple a vote of confidence that they are not that insidious, it could be a blunder. And a big one. Windows has been able to work with A2DP headsets since late 2005, so they have had plenty of time to add the profile to their Bluetooth stack.

A few myths and facts about Bluetooth, versions and profiles for the curious:

1. Profiles are mostly independant of the Bluetooth version. It is perfectly possible to have A2DP in a V1.2 Bluetooth device, just the same as a V2.0 + EDR can have just two profiles and miss many of the usual ones – the mix is up to the manufacturer and driver supplier.

2. EDR stands for Enhanced Data Rate – this does not increase the range, just increases data throughput from around 700kbps to around 2.1kbps, by using a different modulation scheme. The Bluetooth protocol and profiles stay just the same – the advantage is that since data takes almost 1/3rd of the time to send compared to non-EDR devices, there is a considerable power consumption reduction.

3. “Device Y doesn’t support profile Z”. Again, this is up to the manufacturer, and it’s hard to add new profiles, specially in embedded devices. Some chipsets use masked ROM, which means that the Bluetooth stack, profiles and other settings are burned at the time the silicon is printed – so, no software updating on these. Masked ROM is considerably cheaper, although has an initial setup cost of $100.000, so it’s only good for high-volume production runs. The chips can drop $1 to $2 compared to the flash EEPROM counterparts.

As an example of a very poorly implemented Bluetooth solution we can find the Logitech MX5000 keyboard and mouse combo – it sucks. A lot. I am preparing a review that will try to investigate why it does the stupid things it does, such as repeating the first letter you type when it wakes up a dozen times, or why the mouse starts wondering around the screen as if it was possessed by a poltergeist.

  • « Vorherige Seite aufrufen
  • Seite 1
  • Weggelassene Zwischenseiten …
  • Seite 67
  • Seite 68
  • Seite 69
  • Seite 70
  • Seite 71
  • Seite 72
  • Nächste Seite aufrufen »

Seitenspalte

Tags

3D-Drucker Amazon AOL Apple asus memo pad Blackberry Dell DSL E-Book E-Book-Reader Ebay Elster Facebook Google Google Android Handy Hardware Hotmail IBM Internet Makerbot Microsoft mobiles Internet Netbook Prism Quantencomputer Rundfunkbeitrag Samsung samsung galaxy fame Samsung Galaxy Mega Samsung Galaxy Tab SchülerVZ Skype Smartphone Software sony xperia tablet z Suchmaschine Tablet Tintenpatronen Twitter Typo3 WebOS WhatsApp Xing Yahoo

Technik News Kategorien

Ausgewählte Artikel

LTE tilgt weiße Flecken und drückt aufs Tempo

LTE steht für Long Term Evolution und zugleich für den Vorstoß des mobilen Internets in die erste Liga der Breitband-Internetverbindungen. [...]. Heutige Angebote für mobiles Internet bringen 3,6 oder gar 7,2 MB/sec. Der Zugang erfolgt dabei meistens über einen Internet Stick der dank USB-Schnittstelle sowohl an einem Laptop wie auch am Desktop-Computer verwendet werden kann.


Externe Festplatte mit 3,5 Zoll, 2,5 Zoll oder 1,8 Zoll

Angeschlossen wird die externe Festplatte über USB, Firewire, eSATA oder einen Netzwerk-Anschluss. Vorsicht: Bei manch einer externen Festplatte stört ein lärmender Lüfter. Die kleineren Notebook-Festplatten sind 2,5-Zoll groß. Eine externe Festplatte mit 2,5-Zoll nimmt in den meisten Fällen über den USB-Anschluss Kontakt zum Computer auf und wird über dasselbe Kabel auch gleich mit Strom versorgt.

Inhaltsverzeichnis | Impressum und Datenschutzerklärung