Sunday, April 12, 2009

Good to see old timers back

I first heard from ”Bourgeoisie” (an old friend and a geek) of Michael K. Johnson. And only later I came across “Linux Kernel Hacker’s Guide”.I’m personally very happy to see a patch again from him on linux-kernel list after a long time. Tagged: kernel

Understanding tmnet streamyx mail (Fiber To The Home)

FTTH is an all-fiber connection to the home which provides a minimum of 155Mbps bandwidth on both up stream and down stream directions. Basically, it is composed of a fiber from the service node to the optical splitter, the optical splitter which separates to (fan out) terminate on single home ONU.

So similar to FTTC (Fiber To The Curb), FTTH is a point-to-point architecture with a dedicated connection from the home to the network. This fiber link provides secure transmissions by virtue of the fact the it is much harder to tap a fiber than a copper cable.

FTTH is much better suited for broadband service tmnet streamyx setup than DSL and other intermediate technologies. It is our broadband future.

Cost Savings of FTTH

FTTH provides a robust outside plant which requires extremely low malasia over the best adsl speed test of the system. Fiber based networks require considerably less maintenance than traditional copper networks.

FTTH in the US

Currently in the US, FTTH is not yet a real alternative challenge to interactive broadband for free services distributed over cable, DSL, satellite and other media. Why? The simple reason is the cost. The cost for roll out a widespread FTTH infrastructure is exorbitant and therefore currently it is only feasible in urban and business areas.

FTTH offers up to 20 times more bandwidth than ADSL which is tremendous to most Americans. And once the fibers are in the ground, the capacity can be upgrade to even more by simply upgrading or adding new equipment on the end. In the future, FTTH will not only be offered to larger business customers but also for residential customers, SoHos and SMEs.

However, most of the largest telcos are still limiting their FTTH deployment to small-scale trials. But many smaller carriers and newcomers are pushing ahead with actual product offerings and are creating a significant base of fiber users. Bellsouth is playing a very active role. Another active player is Verizon with its FiOS offering.

Fiber-to-the-home connections in the U.S. have more than doubled from a year ago to surpass the 2 million mark, according to data released today from Render Vanderslice and Associates.

Verizon Communications accounts for about two thirds of the country's FTTH subscribers and more than two thirds of the homes passed by fiber.

Other players including AboveNet and Paxio. AboveNet, PAXIO team on FTTH network in San Francisco Bay area.

FTTH in Europe

In Europe, FTTH is just at the beginning of its life cycle. In Germany, BerliKomm (based in Berlin) is preparing to offer FTTH. And in Sweden, Bredbandsbolaget (the leading FTTH player) is already offering FTTH services. In tm streamyx Wienstrom is also offering FTTH service under the name of "i-blizz".

FTTH in Asia

Hong Kong, South Korea and Japan are the world leaders in the percentage of homes that receive broadband communications services over direct fiber optic connections, according to a new global ranking of fiber-to-the-home (FTTH) market penetration.

According to this first ever official ranking of FTTH deployments in the world's economies, 21.2 percent of homes in Hong Kong are wired with FTTH, malaysia flights by South Korea at 19.6 percent and Japan at 16.3 percent. Scandinavian countries occupy the next three positions, with Sweden having 7.2 percent of its households connected to FTTH, Denmark at 2.9 percent and Norway at 2.5 percent.

Taiwan, Italy, People's Republic of China, The Netherlands and the United States round out the top 11 economies, with FTTH penetration rates of between 1.4 and 1 percent of households. Only economies with penetration of 1 percent or more were included in the ranking.

The three regional FTTH Councils joined together to create this first official global FTTH ranking in order to provide the telecommunications industry, governments and regulators with a unique snapshot of international fiber access penetration. Going forward, the councils will update and re-issue the rankings on an annual basis, as well as work jointly to further refine the research methods in order to provide more in-depth information.

Colin Yao is an expert on fiber optic communication technologies and products. Learn more about cable pull machine, cable pulling techniques, cable pulling machine on Fiber Optics For Sale Co. web site.

Gadgets - News & Tips

Image via WikipediaIn the latest installment of Apple’s iPhone security-related patent filings, the Cupertino-based company describes the implementation of loss prevention software that would notify a security agency in the event the handset is lost or stolen, which could in turn lead streamyx bills a police officer being dispatched to the current location of the device

Much has been made of the argument in Open Source circles about the tmnet streamyx email that Open Source offers developing countries, as opposed to expensive or pirated versions of Microsoft. Some of the more common arguments run, contra-Microsoft, that the expensive and proprietary software that runs on Windows is holding back the developing world. Most imply, directly or indirectly, that somehow Microsoft is haggling with poverty. That is, school kids in China, Pakistan, and Guatemala are being denied access to modern education and technology via the proprietary licensing schemes of MS and the Software that runs on it. So it might be. However, what seems to escape such poverty calculations is the true impact of network security and viruses on developing cheap broadband provider and the impact on the World in general. Specifically, the impact that computer security has on development when networks are based on pirated, outdated, or generally insecure software. The largest and most obvious case would be China.

My experience in China:
I recently completed a year teaching English, Computers, and Philosophy at a Chinese university. Around the university, a copy of Windows, on the street, cost the same as a copy of Red Hat Linux or about $1 US. Of course, most Windows software is similarly priced. You can literally find 1-10 guys on every neighborhood block selling copies.

The official university computers also had hot copies of Windows installed in every classroom. In fact, I am not sure I encountered a licensed copy of Windows in my entire year in China. This possibly includes most of the new computers with Windows XP installed at the factory. The Microsoft certified laser stickers are copied almost as frequently as the software. This is in spite of the official best efforts by Beijing to legitimize its entry into the WTO, and promote the use of Linux on government computers.

However, after 10 years of traveling and working in developing countries, I did not consider kuala lumpur so terribly unusual. The World over, hot copies of Windows are the standard in developing computer networks. It was only the very public nature and acceptability of it that seems different in China. As for the social acceptability, it seems to be more a function of Chinese culture than the state of technology or some sort of official public policy. One hazard of being a hardcore Open Source advocate, and coming from a tech world where the software is free (or mostly free), is that in certain respects it tends to make you a bit too comfortable with the concept of software piracy.

What opened my eyes to the true danger of pirated copies, was the first day I entered a classroom,
with my 30 gig portable USB drive. My poor little hard drive, that had been kept safe, sound, and innocent behind a Linux firewall, and never mounted with anything but Linux, was suddenly exposed to the reality of computing in China. It was a virgin drive in the Windows Red Light district of a Chinese university. I had spent so much time on only Linux systems, that I had forgot what it was to battle Viruses and Spyware with every click of the mouse. I no sooner plugged it in, then a complete ecosystem of viruses promptly installed themselves to every directory on the drive. At that moment, it occurred to me that I had never seen a copy of a virus scanner or a firewall like Norton or Trend Micro alongside any of those copies of Windows or the latest Hollywood movies.

I also had at that moment a captive audience of more than a hundred Chinese students.
So I went about taking an informal survey of how many students knew about viruses and virus scanners. My students where at first confused in the sense office broadband thought they did not understand my English. I then carefully explained what a virus was, and what a virus scanner does. After rebooting to a Mandrake Move CD, I even dissected a virus on the overhead projector for them.

Once I was convinced they understood the English word and concept, I asked them again. This time, I received more of a confused look in the sense of 'why would you waste the money'. I repeated this with all my classes at the University. In total, I asked about 1,000 students over the course of the school year, and received more or less the same answer from all of them. They simply did not have antivirus software, or would not buy them if they did sell them. I am aware that companies like Trend Micro are moving into the Chinese market; however, I believe it will be hard to sell virus software in China for a long time to come.

After that first class, I returned home and turned on my Internet connection to confirm what I suspected. My Linux firewall, connected via ADSL, was being bombarded by thousands of viruses and worms. In fact, it was hard to distinguish any legitimate traffic from all the white noise of worms and viruses. Many, like their biological counterparts such as polio, are rarely seen in the West; and A few, like Asian bird flue, have not yet been monitored or detected in the West. I am aware of at least one case of a virus that started life in a Chinese University stealing term papers, later being modified to gather classified documents from companies in England.

The Implications:

It seems a better part of the already limited bandwidth and resources of China are being consumed by infected windows computers. Let me multiply this times an estimate 10,000,000 (official) new users of the Internet a month in China. From personal experience, I can say with a telekom malaysia streamyx deal of certainty, although perhaps not to the extent of China, the Internet in most developing countries is in a similar state. In such developing technological environments, the consumption of valuable resources is in many ways far more of a barrier to development than the simple dollar cost of Microsoft based software.

Consider just a few of the implications. If just 50% of all Internet and computing resources are consumed by malicious activity in a country or region, and it appears to be far more than that in most countries, then the country must devote that much more resources to its development. According to an official Chinese Central Government report, over 80% of all computers in China have been penetrated. Similar studies in the West, have reported upwards of 90% percent of the computers in developed countries. Granted, it depends on how and who reads those types of reports; but the very idea that those are the numbers we are talking about is food for thought alone.

What is of a more critical consideration is the impact on any economy and society at large. How easy is it for Hospital in Guatemala to clean up a computer database after a virus outbreak, as opposed to say a hospital in New York or Paris? How many people do not get treated for real viruses because the hospital spent the money treating digital viruses? As for the implications for the Internet at large, we only need to chant our liberal mantra a little louder about how no one can control the Internet to really see the dark side of things. I will just site the very active issue of the impact of zombies and bot nets on the World.

Our responsibility:

Thus, I would say, that in our rush to help countries develop with food aid, economic aid, and such, that we also lend relief in the areas of technological aid. The obvious, and affordable solution: (drum role please) Linux and Open Source solutions. However, simply carpet bombing the developing world with Linux will not be sufficient. It will require the support of the developed countries and experts to aid in the training and deployment of Open Source solutions. As another Western IT worker in China pointed out, what is often overlooked outside China is that most systems administrators in China never even touched a computer until a few years ago. Further, if I may remind the reader, that poorly deployed servers and software, of any sort, are just as dangerous as Windows. The true doomsday scenario would be networks of millions of zombie computers running on fast, versatile, and stable Linux platforms across the developing world.
On the other hand, I would say that Microsoft in its rush to lock out the developing countries with disabled operating systems, restrictive licenses, and jack-booted copyright enforcement might not be such a bad thing in the long run; however, it is up to the Linux and Open source community to fill the vacuum that we so strongly advocated. Both Nature and the Internet abhor a vacuum.

Chales Spencer is the founder of Spencer Global International with members in 10 countries across North and South America, Europe, and Asia. He currently heads up IT projects for SGmedia, the IT division of Spencer Global.
http://www.spencerglobal.com

Charles Spencer is also currently the editor of http://www.allsouthernchile.com, a development project for the promotion of Southern Chile in English.
http://www.allsouthernchile.com