Updated: 11/24/2005; 11:31:21 PM.

General networking
Data network connectivity developments, networking business news, and related computing items.

daily link  Friday, March 19, 2004

Nokia 5140 RFID Reader - Fun with RFID: A personal sized unit that links with a cell phone.  " The Nokia Mobile RFID Kit extends the mobility of field force personnel .. Simply by touching a smart object, the user can initiate tasks in their Nokia phone - call and send text messages or access databases and record new data entries.

"There are numerous ways to utilize the Nokia Mobile RFID Kit in a business", said Gerhard Romen, Head of Market Development, Nokia Ventures Organization. "The user can easily launch services and conveniently access phone functions like dial or send messages, just by touching smart objects, in this case RFID tags. The phone reader will read the content of the smart object, and translate it to an action. For example, a field service engineer can intuitively start browsing the latest service instructions to repair a machine on site. It is also possible to collect meter reading data to the phone by keying the reading into the phone, replacing the paper and pen method still widely in use today. The Kit can also replace the pen and paper method in recording time and attendance, for example."

The Nokia Mobile RFID Kit is part of the Nokia Field Force Solution and operates in the 13.56MHz frequency range, at a very short range of typically 2-3 centimetres, using the ISO-14443A standard. The short reading distance is optimal for field force solutions where tags placed in premises and devices are read individually by a workforce that moves." 

There could be consumer applications too.  Scan a store item and find its price online (via froogle, e.g.).  Find out if others are scanning you, or find the tags on objects you own.  Pick up a CD in a store and have the songs streamed to your phone.  It changes things when the consumer is the scanner.

  9:03:28 PM  permalink  

Blogad classifieds: Buy a week on a small blog for $20, or a large political one for $400.  3:19:52 AM  permalink  

News blogs making money: "Weblogs are going commercial. Marketers including Xerox, America Online and CNN have run ads on some of the Internet's most popular blogs, according to the Wall Street Journal. A spokesman for the Interactive Advertising Bureau said blogs really are not on the radar of large, mainstream advertisers. But two politically oriented efforts, Daily Kos and TalkingPointsMemo.com, are reportedly generating as much as $5,000 a month in revenue. A Chapel Hill, N.C. company has started to represent these online publishers to advertisers. Henry Copeland, founder of the Blogads service told the Journal he's placed ads on about 200 blogs"  2:41:04 AM  permalink  

WiFi paid hotspots disappoint:  Hotspots worldwide generate $80m/yr, in the US $28m -- "what Verizon Wireless generates every 12 hours" with cell phones.  Analysts expect that no hotspot provider will make money before the end of 2005.  Cometa has built only 230 hotspots and won't say how many of the original 20,000 planned will actually get built. 

In Asia, providers are selling access at lower prices.  In S Korea, one provider offers unlimted wifi for $13/mo, or only $1/mo additional for home broadband subscribers. They have 360,000 subcribers.  Similar Hong Kong providers have 40,000. Last year, 4.7m Asians used a hotspot, compared to 2.7m Americans and 1.7m Europeans.  Resistance to $6/hr or $10/rates is high.

  2:17:21 AM  permalink  

ISP Gets Tough With 'Zombie' Customers: "Chris Belthoff, a senior security analyst at Sophos, said zombie machines are a drain on an ISPs' bandwidth and storage budgets [and] call center costs .. "The problem Comcast is trying to solve is a very serious one," said Belthoff, whose research has found that about 30 percent of spam comes from consumer-based PCs. ..

Antivirus experts estimate that the recent MyDoom-A worm compromised 500,000 to 1 million computers -- all with open proxies. And they expect that army of zombie machines will be put to use in the spam community, much as anti-spam experts believe computers infected with the Sobig virus were. For end users, the best advice is to keep antivirus and personal firewall programs updated, Belthoff said. And from Comcast's point of view, setting up a personal firewall is increasingly becoming a customer requirement for getting online. "

  1:47:06 AM  permalink  

Hackers Embrace P2P Concept: "Computer security experts in the private sector and U.S. government are monitoring the emergence of a new, highly sophisticated hacker tool that uses the same peer-to-peer (P2P) networking abilities that power controversial file-sharing networks like Kazaa and BearShare.

By some estimates, hundreds of thousands of computers running Microsoft's Windows operating system have already been infected worldwide. The tool, a program that security researchers have dubbed "Phatbot," allows its authors to gain control over computers and link them into P2P networks that can be used to send large amounts of spam e-mail messages or to flood Web sites with data in an attempt to knock them offline. "

  1:39:47 AM  permalink  

March 2004
Sun Mon Tue Wed Thu Fri Sat
  1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 31      
Feb   Apr
Subscribe to "General networking" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.
Click here to visit the Radio UserLand website.


Copyright 2005 © Ken Novak.
Last update: 11/24/2005; 11:31:21 PM.