• Zum Inhalt springen
  • Zur Seitenspalte springen

Technik News

Das Blog zu IT, Mobilfunk & Internet

Fon: maybe a not-so-social router

Juni 7, 2006 von Harald Puhl

I have recently been following Fon, a movement that aims at creating a worldwide WiFi network, with Bills, Linuses and Aliens sharing their broadband with others, some for free, others for profit – split with Fon. The basis of Fon is that you connect a Linksys WRT54Gx WiFi router running special firmware to your broadband internet connection. This firmware turns the router into a captive portal, which then allows you to control access to the internet.

During the last couple of weeks, there has been some noise at Fon about having finally achieved production of their own WiFi router – they call it La Fonera. The move may seem obvious, as right now, they are buying the Linksys routers at full reseller price, in turn reselling them heavily subsidized at $25 a piece $1, as I’ve just read a minute ago. What I still don’t get is the title of the recent post in Martin Varsavsky’s blog, ‘Fon, the Social Router’.

A few days ago, Fon announced the purchase of 1.000.000 (literally!) of these new routers from the taiwanese manufacturer Accton. This company already manufactures WiFi routers, amongst other devices, and so it’s perfectly plausible that they can manufacture a customized router for Fon.

The main reason for manufacturing anything in China or Taiwan is the labour costs are extremely low. The electronics aren’t cheaper over there, and as a matter of fact, most of the core components are sold by western companies, such as Broadcom, Intel and Atmel. Labor conditions in chinese plants vary, from outright slavery to pretty good, but even then, one thing is a fact: they work all year round, including all weekends, only having ten days off for the Chinese New Year.

Reading Accton’s site, it appears that they treat their workers very well, and I applaud that. But this also means that they cannot produce as cheaply as the sweatshop-style manufacturers. A WiFi router with the horsepower required to run Fon’s platform is not cheap – let’s estimate roughly $22 per unit, for a purchase of 1 million units. If this estimate is correct, Fon would have blown on these routers a tad more than the entire funding they got from Skype, Sequoia, Index and Google.

If they were to give away the routers, to recoup this investment Fon would have to sell approximately 11 million 24-hour access packages, at $2 each. That is assuming Fon takes 100% of the money – with the Bill model, they would only get 50% of the income, as it is shared with the person providing the broadband and maintaining the hotspot. If they were to sell the routers at cost, they’d still have a huge logistics nightmare in their hands. Failure rates in mass-produced electronics range between 1% and 3%, meaning they could have up to 30.000 returns, costing them $1.32 million in hardware, plus logistics and other costs. One thing is to be a promoter of social WiFi – another is to turn into a hardware manufacturer – be it by ODM contracts, or by making the devices yourself.

So, I leave some open questions: has Fon chosen a company that respects human rights, treats its workers with dignity, but won’t give them a good deal as they could have gotten somewhere else, thus affecting their ROI expectations? Does investing in 1 million routers make economic sense with their current business model?

The most expensive wardrive ever

Juni 6, 2006 von Franz Hieber

If you’ve done a more expensive one, I’d like to hear it!

Today I had to get to the center of Geneva from the airport, and in a bit of a hurry as the meeting I had to attend was getting close. I decided to take a taxi, which would also allow me to do a quick wardrive using my Qtek and a Bluetooth GPS. Finding almost 80 WiFi access points on the way was great, but the bill was painful! In all, the round trip from and back to the airport cost me 60 euros, some quick math makes each AP cost 75 cents (around $0.96).

Tomorrow, I will post some stats and a quick map of the captured APs. The stats will of course go to WiGLE, and the map will be made using an updated version of StumbVerter I’m working on – this will use MapPoint as usual, but you will also have the option of creating maps in Google Earth format. However, they will not look like the usual 2D icon maps that can be made using existing scripts, but will feature the traditional Netstumbler towers in 3D. How to show the signal strenght is being worked on, any suggestions?

Unix Course: Introduction, Shell Commands – Lecture 1

Juni 6, 2006 von Harald Puhl

The inside of Athena Unix

A. Course Outline
   1. Advanced use of the UNIX shell
   2. The internal workings of the mail system
   3. The notes teleconferencing system
   4. Networking
   5. Distributed File Systems
   6. Security
   7. Kernel
   8. The Ingres Database
   9. System Administration

B. UNIX from the system’s point of view
1. Jobs, Programs and Processes

a. What is a program?

A program is a sequence of instructions or commands which tell the computer how to accomplish a given task.  Under UNIX, this can either be a program which has been compiled, or it may just be a sequence of commands that you would normally issue to accomplish the task.  The latter type of program is often called a shell script.

b. What is a process?

A process is an invocation of a program.  If you run finger twice, each time you ran it, a new process was created.

c. Programs and processes encountered when logging in

1. getty
This process sits watching a terminal until someone  types something.  When someone does, it starts a login process.  Getty runs underneath another process                called init.

2. login
 When login is first called, it is given the username which you typed into getty.  It then asks for your password, checks it, and if correct performs the  steps of logging you in.  These include updating the wtmp and utmp files (Who is loged in), starting a shell (or whatever is listed in you /etc/passwd entry), giving your process the correct groups, and setting ones UID correctly.  If the password was incorrect (or if the user ID is invalid), login will  ask for your user id again.

3. init files
Once your shell has started, it reads several files from which it executes commands.  If you are running the cshell, .login and .cshrc are executed.  If you are running the bourne shell, .shrc and .profile are run.
      
d. What is a job?
The definition of job is not very clear.  In many cases you will see the term used instead of process.  Another common use of the term job is as a „session“.  In other words, everything being done by a given user from a given terminal.

 
2. Programs v. System Calls

One distinction which I want to make clear that is very important in understanding UNIX (or any other operating system for that matter) is the difference between a command and a system call.  A command in UNIX is usually a program which does something.  The command, in turn, executes system calls which actually perform the actions. 

D. The Shell

The following commands are built into the shell.  They are different than must Unix command in this respect since command such as cp and rm are actually separate programs.

1. Shell Commands
. alias    – Declare an alias for a command
. bg       – Run a process in background
. cd       – Change directory
. eval     – Evaluate an shell expression
. exit     – Exit the shell (killing it – must not be login shell)
. fg       – Run a process as your foreground process
. history  – Display recently executed commands
. jobs     – List processes which are children of the shell
. kill     – Kill a process
. logout   – Log out
. nice     – Run a command with a higher niceness     
. rehash   – Reinitialize table of commands
. set      – Set a shell variable
. setenv   – Set an environment variable
. source   – Take commands from a file
. stop     – Stop a process
. suspend  – Stop the shell
. umask    – Set default value for protection
. unalias  – Remove an alias
. unset    – Unset a shell variable
. unsetenv – Unset an environment variable

  • Unix Course: Introduction, Shell Commands – Lecture 1
  • Unix Course: The Shell, and Shell Programming – Lecture 2
  • Unix Course: More Shell Programming – Lecture 3
  • Unix Course: Unix Security – Lecture 4

Hacked-up displays – Geneva airport

Juni 6, 2006 von Harald Puhl

Today, I attended a business meeting in Geneva, and on the way back, noticed the info panel at the airport was on a bit of a vacation. geneva_airport

TomTom’s hidden all-terrain mode

Juni 2, 2006 von Harald Puhl

Sometimes, I feel like a human GPS navigator. And there are probably many more of us out there. Ever get a call from your wife, asking you to direct her to some remote place she is trying to drive to? My solution was to get a TomTom 500 navigator for her birthday. It comes with the maps for Spain in full detail, and a basic map of Europe, with main roads and cities. It can also be used as a Bluetooth handsfree for your mobile phone, so it’s quite a convenient device.

We set about trying it during a trip to visit my mother – since I knew the way, it would be a good sanity check on the navigator’s ability to lower our phone bills. When I told it where we wanted to go, and it told us to turn west instead of east, I started imagining what would happen. After a few minutes of following the navigator’s instructions without even looking out the window, this is where we ended up:

tomtomYes. It wanted us to go up a dirt path that only horses (and fit ones at that) can manage. Take a close look at the full-resolution picture, and judge by yourself.

After turning around, and following the route we always take, we had to turn off the sound for almost half the trip, as it kept insisting that we should “turn around as soon as possible” so we could take the easy-going dirt track.

GPS navigator manufacturers only make the devices, but not the data that’s in them. There are a few companies, such as Navtech and TeleAltlas, who take care of that, and license the use of the data. In this case, it seems that overzealous cartographers had simply taken anything that looked like a road in survey maps, and turned them into navigable paths. The result is my unfortunate experience. The collateral is that my wife doesn’t trust the device, unless it’s for navigating within city limits – thus limiting it’s usefulness, and not limiting my phone bill so much.

Hacked-up displays – Barcelona Metro

Juni 2, 2006 von Harald Puhl

I’m going to start a section called Hacked-up displays, or HUDs for short.
barcelona_hudHUDs are public displays, screens and panels which are caught showing something they shouldn’t be, by fault or by hack. There is a classic roadside HUD here, as a good example. I’m posting this phonecam pic of an infoscreen at the Barcelona Metro, which usually shows videos, news and other stuff to bored passengers waiting on the platforms – and with which DirectPlay was not happy.

The rules:

1. Any image of a HUD is allowed, unless it contains foul language and/or explicit images.
2. Pics taken must be submitted with a short explanation of context, or if a hack was involved, a more detailed story of events.
3. Please advise if you want credit or want to remain anonymous. Confidentiality of submissions is guaranteed (thanks Apple!)

  • « Vorherige Seite aufrufen
  • Seite 1
  • Weggelassene Zwischenseiten …
  • Seite 69
  • Seite 70
  • Seite 71
  • Seite 72
  • Nächste Seite aufrufen »

Seitenspalte

Tags

3D-Drucker Amazon AOL Apple asus memo pad Blackberry Dell DSL E-Book E-Book-Reader Ebay Elster Facebook Google Google Android Handy Hardware Hotmail IBM Internet Makerbot Microsoft mobiles Internet Netbook Prism Quantencomputer Rundfunkbeitrag Samsung samsung galaxy fame Samsung Galaxy Mega Samsung Galaxy Tab SchülerVZ Skype Smartphone Software sony xperia tablet z Suchmaschine Tablet Tintenpatronen Twitter Typo3 WebOS WhatsApp Xing Yahoo

Technik News Kategorien

Ausgewählte Artikel

LTE tilgt weiße Flecken und drückt aufs Tempo

LTE steht für Long Term Evolution und zugleich für den Vorstoß des mobilen Internets in die erste Liga der Breitband-Internetverbindungen. [...]. Heutige Angebote für mobiles Internet bringen 3,6 oder gar 7,2 MB/sec. Der Zugang erfolgt dabei meistens über einen Internet Stick der dank USB-Schnittstelle sowohl an einem Laptop wie auch am Desktop-Computer verwendet werden kann.


Externe Festplatte mit 3,5 Zoll, 2,5 Zoll oder 1,8 Zoll

Angeschlossen wird die externe Festplatte über USB, Firewire, eSATA oder einen Netzwerk-Anschluss. Vorsicht: Bei manch einer externen Festplatte stört ein lärmender Lüfter. Die kleineren Notebook-Festplatten sind 2,5-Zoll groß. Eine externe Festplatte mit 2,5-Zoll nimmt in den meisten Fällen über den USB-Anschluss Kontakt zum Computer auf und wird über dasselbe Kabel auch gleich mit Strom versorgt.

Inhaltsverzeichnis | Impressum und Datenschutzerklärung