Gordon And Mike's ICT Podcast
Perspectives on Technology and Education from Gordon F. Snyder, Jr. & Mike Qaissaunee

Last week at the Convergence Technology Center's Winter Retreat at Collin College in Frisco, Texas Sam Bowne from City College of San Francisco gave a brief description and update on the Wikileaks "situation" thus far. Here's Sam's excellent 16 minute and 51 second presentation.


Direct download: SamBowneWikileaks.m4v
Category:podcasts -- posted at: 7:01pm EST

Tim Frick at Mightybytes recently talked with Inc. Magazine journalist Minda Zetlin about how people are using Twitter. Zetlin had recently featured Frick in an article titled Secrets of Highly Effective Twitter Users. After that conversation, Frick wrote his own piece titled 10 Tips For Maximizing Your Twitter Account In this podcast, we review and comment on Frick’s ten tips.

Before we discuss these tips, we also discuss some recent events in technology including:

The FCC and net neutrality
The iPad and Macbook Air
The Rockmelt Browser that integrates social media into your browser.
Tim Wu's book The Master Switch: The Rise and Fall of Information Empires
The London School of Business and Finance Global M.B.A. - they are offering an MBA through a Facebook application

Here’s the 10 Twitter tips we discuss:

Tip 1. 125 or less. Don’t max out characters.

Tip 2: Make the most of search functions.

Tip 3: Follow the right people

Tip 4: Trends and hashtags

Tip 5: Content strategy

Tip 6: Use URL shorteners

Tip 7: Don't stop at text

Tip 8: #NewTwitter Tip: Got TubeMogul

Tip 9: Find old Tweets.

Tip 10: Alert Yourself

Be sure to check out Frick’s excellent book Return on Engagement: Content, Strategy, and Design Techniques for Digital Marketing.

Direct download: 10_Twitter_Tips_Podcast.mp3
Category:podcasts -- posted at: 12:24pm EST

In this podcast we discuss Erik Eckel's 10 Best IT Certifications for 2010 post along with Mike's recent blog posts on IT certifications.







Direct download: IT_Certifications.mp3
Category:podcasts -- posted at: 2:56pm EST

This is our third network security podcast with Sam Bowne, Professor of Computer Networking and Information Technology from City College of San Francisco.  We continue our discussion with Sam sharing his thoughts on security and providing us with a snapshot of some of the latest and greatest developments in the field of network security.

In the Podcast we discuss - among other things:

A living bot army control center. IE and Firefox: http://krebsonsecurity.com/2010/05/revisiting-the-eleonore-exploit-kit/ 

The recent Google I/O conference which Sam attended. At the conference Sam got a couple of phones one of which (a Droid)he is awarding as a prize in an IPv6 contest:  http://samsclass.info/ipv6/droid-contest.html 

The Hurricane Electric IPv6 Certification program:  http://bit.ly/d4cRAK

Sam also discussed and provided a few more IPv6 related links:

IPv6 Panel: http://tinyurl.com/2746v7f  
IPv6 Summit in Denver: http://tinyurl.com/23mu7u2  
IPv6 Certification: http://ipv6.he.net/certification/  
IPv6 Tunnels: http://www.tunnelbroker.net/  
Excellent slides explaining IPv6 for beginners: http://www.openwall.com/presentations/IPv6/
Sam's IPv6-only Web page here: http://samsclass6.info -- you won't see it with plain old IPv4 at all.

An excellent discussion with Sam!


Direct download: Sam_Bowne_2010-06-17.mp3
Category:podcasts -- posted at: 1:06pm EST

Joomla! is a popular open source content management system (CMS), that enables you to build Web sites and powerful online applications. Last week I had the chance to discuss Joomla! with Natasha Goncharova and Tamar Schanfeld from TNR Global.

Direct download: TNRjoomlaInterview.m4v
Category:podcasts -- posted at: 12:55pm EST

On Monday (5/2/10) Mike Q and I recorded a podcast titled Cloud Computing Technologies. The podcast references a couple of Infoworld.com documents that I think you will find interesting:

This Deep Dive report breaks down cloud computing into 11 categories and goes into more detail than the shorter white paper. What's really interesting is the categories are different in each document. You can see where the confusion lies when it comes to defining what cloud computing is. Here's the 11 cloud technologies we discuss:

  1. Storage-as-a -service
  2. Database-as-a-service
  3. Information-as-a-service
  4. Process-as-a-service
  5. Application-as-a-service (a .k .a . software-as-a-service)
  6. Platform-as-a-service
  7. Integration-as-a-service
  8. Security-as-a-service
  9. Management-/governance-as-a-service
  10. Testing-as-a-service
  11. Infrastructure-as-a-service

We also discuss the CloudCamp event (great places to get info and meet people involved in cloud technologies) we hosted at Springfield Technical Community College last month and how you can get information on CloudCamps in your area.

Direct download: CloudComputing.mp3
Category:podcasts -- posted at: 11:08am EST

On Sunday (4/25/10) Mike Q shared his initial impressions after some hands-on time with an iPad. Mike does a great job describing the device along with some of his favorite applications for the device. Here’s some of the questions he answers:

  • So Mike you broke down and got an iPad - which one did you get?
  • Why only 16 gig?
  • So how long have you had it?
  • So give us some of your impressions. How is the battery life?
  • What about the screen?
  • What about the keyboard?
  • How much is the case?
  • Did you get any other peripherals? Can you connect it to a projector for presentations?
  • Have you been to the app store? What are some of your favorites so far?
  • What do iPhone apps look like on the iPad?
  • OK, how about some apps? Let's start with the iWork suite.
  • So what's your assessment of these apps?
  • What about Keynote?
  • Have you moved your Kindle content over? And, speaking of the Kindle I know you have a first generation one how do they compare as a reader?
  • What about some quick hits on some apps that you've found interesting ? 
  • Does it have a GPS radio? Have you tried out any of the location based applications?
  • What about some quick hits on some apps that you've found interesting ?
  • Whats up with Israel banning iPads?

Mike also provided a few screen shots from the device:

  • Here's a screen shot of a dictionary lookup created on the iPad.


  • Here's an OmniGraffle example created on the iPad.



  • Here's a Penultimate example created by Mike on the iPad.



Note: After we recorded the podcast, the Israeli Government lifted the ban on the WiFi iPad.

Direct download: iPad_Podcast.mp3
Category:podcasts -- posted at: 2:11pm EST

On Tuesday, we did our second network security podcast with Sam Bowne, Professor of Computer Networking and Information Technology from City College of San Francisco. We had a nice discussion with Sam sharing his thoughts on security and providing us with a snapshot of some of the latest and greatest developments in the field of network security.

Here’s some of the questions we asked Sam:

In our last conversation you mentioned that you got a BS and PhD without ever graduating high school. A number of listeners were amazed that you were able to do this and wanted more details – for example did you get a GED? Did you take the SATs?

Mike sent over an article on password cracking – did you see anything interesting in that article?

It’s been over a month since we last spoke. You had mentioned the PWN 2 OWN contest and were also planning to attend some training. Could you tell us the outcome of the contest and anything interesting you learned in your training?

Any interesting news in network security exploits or defenses in the last month?

Sam discusses a number of things in the podcast including:

  • Lifehacker password-guessing
  • Web of Trust Firefox (and Chrome)Extension
  • NoScript Firefox Extension
  • IPv4 Address Exhaustion
  • Wikileaks

Sam's class content, email and lots of other great stuff can be found at http://samsclass.info/ Check him out - one of the best!




Direct download: Network_Security_4_20_10_.mp3
Category:podcasts -- posted at: 6:45pm EST

Femtocells are just starting to be deployed in a broad range of applications with major network operators announcing rollouts in the USA, Europe and Asia.  They are basically small cellular base stations that people can put in their homes or businesses. They connect using a broadband connection (DSL, Cable, Fiber, etc) in the home or business. ABI Research forecasts that the total femtocell market in 2010 will reach 2.3 million units, and will exceed 45 million within five years. In this podcast we take a look at this emerging communications technology.

Here's some of the questions we discuss and answer:

  1. What are femtocells?
  2. How many phones can they support?
  3. Are products currently available?
  4. Let’s pick one and dig a little deeper on the device features. How about AT&T since it is the newest offering.
  5. So, you need to have a broadband connection on the site in place?
  6. Why is there a GPS radio in a Femtocell device?
  7. What about Femtocell Quality of Service or QoS?
  8. Are the Sprint and Verizon products 3G like AT&T’s?
  9. What about pricing?
  10. Is there a monthly fee?
  11. So, we had talked about the problem Mark was having with lack of cellular signal in his home and office. Would one of these in his home and another in his business solve his problem?


Direct download: Femtocell_Podcast.mp3
Category:podcasts -- posted at: 3:05pm EST

In this podcast, we’d like to introduce Dr Sam Bowne – Professor of Computer Networking and Information Technology from City College of San Francisco. Gordon and I have known or known of Sam since 2004. Sam is a tremendous classroom instructor bringing his extensive expertise in and passion for networking and network security to his students and his colleagues. Sam is also generous with his knowledge, making his lectures and classroom materials available to anyone who wants to learn. In what we hope will be a recurring role, Sam joins us today to share his thoughts on security and provide us with a snapshot of the latest and greatest developments in the field of network security.

Here's some of the questions Sam answers:

1. Sam you have a BS and a PhD in Physics – how did you end up in networking and security?

2. You’ve been at CCSF since 2000 – what classes do you teach?

3. Ethical hacking? Sounds like an oxymoron – what do you mean by ethical hacking?

4. I know you’ve taken some of your students to DEFCON in Las Vegas. This conference of hackers is probably unlike anything our listeners have ever attended. Could you tell us a little about it?

5. Are most of the attendees self-taught or do they attend formal classes?

6. In terms of recent developments (threats, security solutions, and research), what’s been on your radar screen lately?

7. Sam how do you keep up with all of this information?

8. What about your own skills and knowledge? How do you keep these up-to-date?

9. If a student is interested in learning more about networking – in particular securing a network, how would you advise them to get started? What sort of characteristics – in a student – would make them a good candidate for this type of work?

10. Now for something from a chat session with a student:

  • my twitter account was hacked :( -- maybe i should hop on that security course just for some personal safety
  • do you, yourself actually keep different passwords for everything?
  • i'm freaked out and want to differentiate all my passwords
  • but, that's crazy!

What advice can you give my studemt?

Sam's class content, email and lots of other info can be found at http://samsclass.info/ Check him out!!


Direct download: Podcast_1_with_Sam.mp3
Category:podcasts -- posted at: 7:28pm EST

In our last podcast we discussed the past 20 years and how things have changed when it comes to broadband and cellular wireless service. In this podcast we provide an update on 4G services including LTE and WiMax.

  1. I know we’re seeing Voice over IP services in our homes over wired connections. How about the wireless industry?
  2. LTE is considered a fourth generation wireless technology - correct?
  3. What's the history with LTE? How did it get started?
  4. How about some LTE performance details?
  5. Besides just bandwidth (whish is nothing to ignore), what would you consider to be the big difference between LTE and earlier technologies?
  6. So, LTE is faster and in a way similar. Could you summarize some of the major features?
  7. Now, WiMAX is a little different than LTE but still considered 4G. Can you explain?
  8. Wasn't WiMAX originally proposed as a stationary technology?
  9. But now WiMAX supports mobility?
  10. How would you describe WiMAX architecture?
  11. So, how would you compare WiMAX, LTE and 3G?
  12. So, we talked about Mark's dilemma in the podcast before this. Do you think 4G will help him?
Direct download: 4G_Technologies.mp3
Category:podcasts -- posted at: 7:16pm EST

In this podcast we take a look at the emergence of broadband and wireless technologies over the past 20 years.

Mike: What lead to this podcast?

Gordon: It was an email from a colleague of ours - Mark at the MATEC NSF center. Here’s what he said:

I  was reading this PC Magazine article on why Apple stayed with AT&T (not happy about that since AT&T really stinks in Phoenix on coverage – if I remember correctly, one of the worst coverages and signals here.  In fact, Sprint is really the only company that works well by the mountains (where I live and work).  But the article stated:

CDMA, the way Verizon and Sprint are doing it, is a dead end. Apple hates dead-end technologies. They look forward, not back. Remember how they got rid of floppy disks earlier than any other PC manufacturer? The current CDMA technology that Sprint and Verizon use still has some years of life left on it, but it's not where wireless is heading.

Ok, so CDMA is dead.  But what is 4G?  And is all 4G using GSM?  Sprint is starting to advertise here of their 4G network.  I know 4G is faster.  But where is wireless going?  Is Sprint’s 4G the same as all the other’s 4G.


Ok, so hopefully this is a blog topic for you, but if not, I think you for the time on your answers.  Oh yeah, any idea when AT&T would go to 4G?

Have a great day,

             Mark from Arizona

Before we tried to answer Mark's questions we thought it would be a good idea to take a look first at where we’ve been over the past 20 years or so with a follow-up podcast on 4G technologies.



Direct download: Emerging_Broadband.mp3
Category:podcasts -- posted at: 8:27am EST

We had the honor of having Dr Karl Kapp keynote the second day of the Winter 2010 ICT Educator Conference held the first week of January in San Francisco. Karl is a professor of Instructional Technology, author, speaker and expert on the convergence of learning, technology and business.  His background teaching e-learning classes, knowledge of adult learning theory and experience training CEOs and front line staff provides him with a unique perspective on organizational learning. Karl teaches graduate-level courses on topics of virtual learning worlds, e-learning applications and the business of e-learning at Bloomsburg University and consults with Fortune 500 organizations on implementing virtual learning worlds and learning technologies. He is author of four books including, Gadgets, Games and Gizmos for Learning and Learning in 3D: Adding a New Dimension to Enterprise Learning and Collaboration, co-authored with Tony O'Driscoll.  Karl's keynote was delivered at the beautiful San Francisco Microsoft facility (Thanks Microsoft!) and titled Leveraging Virtual Worlds, Web 2.0 and Smart Phones for Educational Excellence. Here's a description of the presentation:

Are your classroom interactions designed to teach the new breed of learner - a learner raised on a steady diet of video games, electronic gadgets, and the Smartphones? Wondering how to integrate new technologies into your classroom? Can't imagine why anyone would want video games and Twitter in the classroom? Learn how the consumer-based gadgets, games and web widgets are changing community college education forever. The influence of games, virtual worlds and Web 2.0 on learning preferences, expectations and collaboration is just now becoming visible and is profoundly impacting community colleges. Learn how to leverage this technology for educational excellence. See examples of virtual worlds teaching science, iPods teaching basic chemistry, simulations teaching aircraft testing, and gadgets increasing student interactions in the classroom.

Want to see more of Karl - check out his blog at www.karlkapp.blogspot.com



Direct download: WC_2010_Karl_Kapp.mov
Category:podcasts -- posted at: 8:15pm EST

In this podcast we discuss the emerging threat of steganography in voice over IP.

This is really interesting - is it something that is already happening?

Currently, this seems to be confined to research labs. The primary reference for this podcast is an IEEE Spectrum article by three professors - Józef Lubacz, Wojciech Mazurczyk & Krzysztof Szczypiorsk - at Warsaw University of Technology. This is part of their ongoing research, as part of the Network Security Group, to identify emerging threats and develop countermeasures.
Before we delve into this new topic, lets provide the audience with a little background. First what is steganography - sounds like a dinosaur?
Yeah - the Stegosaurus. I'm not sure how or if the two are related; we'll leave that one for the Paleontologists in the audience. 
Steganography is something that has been around a long time - some say as far back as 440 BC. While encryption takes our message and scrambles it, so that an unintended recipient cannot read it, steganography attempts to hide or obscure that a message even exists. The researchers refer to steganography as "meta-encryption." Another useful analogy they use is to refer to the secret message and the carrier within which it is hidden.
Can you give us some examples?
If we start in ancient times, we can point to examples of shaving a messengers head, tattooing a message on their head, letting the hair grow back and sending them off. Other examples include using invisible ink or even writing on boiled eggs with an ink that penetrates the shell and can be read by peeling the egg. Simon Singh's "The Code Book" is a great read that details the history of encrypting and obscuring information. 
What about some more modern examples?
When we refer to modern steganography we are usually referring to digital steganography. Digital steganography takes advantage of digital data by (for example) hiding a message within  images, audio, or video files. In this case the image, audio or video file is the carrier. The larger the file (image, audio or video) the larger message it can carry. The researchers contend that a single 6-minute mp3 audio file, say roughly 30 megabytes in size, could be used to conceal every play written by Shakespeare. 


So how does this work?
Say you and I wanted to communicate using steganography. We would each download one of the hundreds of freely available stego apps. You would take a fairly innocuous image file, use the software to embed a message into that file, and send me the altered file. To anyone else, this would just look like a photo you're sharing with a friend, but because I know there's a hidden message, I open with the same stego app and read the hidden message. You could also add a password to further protect the message.
So how do we stop this?
This is a specialized field called "steganalysis." The simplest way to detect a hidden message is to compare the carrier file - our innocuous image - to the original. A file that is larger than the original is a red flag. This of course presupposes that you have access to the original file. In most cases, this will not be the case, so instead, we look for anomalies. Is the audio file significantly larger than a 3-minute audio file should be? We can also use spectrum analysis or look for inconsistencies in the way the data has been compressed. 
How would spectrum analysis help?
Some steganography techniques try to take our digital data and modify the least-siginificant bit. In our digital data the LSB often just shows up as noise and doesn't effect the image, audio, or video quality. A spectrum analyzer would help us to compare the "noise" in an unaltered sample and to try and identify anomalies.


Wow - that's scary stuff. What about Voice over IP[is this part OK]?

Voice over IP or ("voype") is a transmission technology that enables us to deliver voice communications over IP networks such as the Internet. This is an alternative to using the traditional PSTN or public switched telephone network for voice communications. In VoIP, we take our analog voice signal convert it to a digital signal and "chop" it up into smaller pieces called IP packets. These packets are sent over our data network and reassembled at the destination. 

To understand packet-switched networks, consider the US Postal system – our packets are analogous to postal letters or parcels, numbered, sent across a network and re-assembled at the receiving end. Packets do not follow the same path from source to destination and may even arrive out of sequence. In VoIP, it's more important that we transmit our data quickly, so we forego the numbering or sequencing.


So what about this new class of steganography?
One of the disadvantages of existing techniques is the size limitation of the carriers. If someone tries to put to large a message into an audio file, it becomes easier to detect. With VoIP, our message is hidden among the packets - even bits - of voice data being transmitted. In a sense, older technologies used a digital file as the carrier, while these new, emerging techniques use the communication protocol itself as the carrier. The size of the hidden message is only limited by the length of the call. While detecting a hidden message in a physical file is not trivial, the difficulty of finding a hidden message increases an order of magnitude when there is no physical file to examine. The researchers are calling this new class of steganography - "network steganography."

So how does network steganography work?

The researchers have developed three methods that all manipulate the IP or Internet Protocol and take advantage of the fact that this is a connectionless and unreliable protocol. Network steganography exploits errors (data corruption and lost packets) that are inherent in the Internet Protocol.
What are the three methods?

The three methods or flavors of network steganography that the researchers have developed are:

  • LACK or Lost Audio Packet Steganography
  • HICCUPS or Hidden Communication System for Corrupted Networks, and
  • Protocol Steganography for VoIP
Briefly, LACK hides a message in packet delays, HICCUPS disguises a message as noise, and Protocol Steganography uses unused fields in the IP protocol to hide information.
So let's talk a little bit more about each - first LACK.
VoIP traffic is very time sensitive - if a voice packet (about 20 milliseconds of conversation) is delayed, we can continue our conversation without significantly effecting the call quality. Once the delayed packet does arrive at the receiver, it's already too late; the packet is useless and is either dropped or discarded. That's the way VoIP is designed to work. LACK intentionally delays some packets and adds the "steganograms" in these intentionally delayed packets. To an unintended recipient, these packets appear to be late and are discard, but to the party you're communicating with they are retained and decoded to extract a hidden message. LACK is a simple technique that is hard to detect.
What about HICCUPS?
HICCUPS works on wireless local area networks and takes advantage of corrupted packets. Normally, in a wireless network, we check for corrupted data by examining the checksum of a received packet. If the checksum doesn't match what we expect, we discard the packet. HICCUPS hides our message - the steganograms - in these seemingly "corrupted" packets. Unintended recipients will discard these packets, but our cohort knows to look for these "corrupted" packets and to retain and examine them. This method is difficult to use, because it requires a NIC card that can generate incorrect checksums. It is also difficult to detect.
Okay what about Protocol Steganography?
Here, we're hiding our message in the actual header fields of the IP packet. In particular, we're hiding information in unused, optional or even partial fields. To make it even harder to detect, we could use fields that frequently change.
So, should we be worried?

I don't think so. The majority of the steganography applications seem to be focused on altering images, which appears to be the easiest form of steganography. While the techniques these researchers have developed are technically feasible, I'm not sure that they're easily implemented. There has been lots of speculation regarding terrorist organizations using steganography to communicate however, no one has been able to document that this has actually happened. That said, I have no doubt that these groups are exploring ways to mask their communications and that the NSA has developed and uses a wide arrays of tools and countermeasures for steganography.

Direct download: VoIP_Steganography.mp3
Category:podcasts -- posted at: 9:44am EST

On January 14, 2010 we hosted Online Impact 2010 in the Springfield Technical Community College (STCC) Technology Park. This was the second business and industry Online Impact event held at STCC - we had the first one in June 2009. Both events focused on the use of social media sites like Twitter, LinkedIn and Facebook to reach out to customers and prospects. We had an excellent half-day of panels and workshop sessions that focused on social media tips and tactics.

This podcast is a recording of the first panel, moderated by Dave Sweeney from viz-bang.com. I won’t introduce the panelists – Dave does it as part of the podcast.

We’re already planning the next Online Impact event – watch our website at ictcenter.org for details.

Direct download: OLI_2010_Panel_1_Discussion.mp3
Category:podcasts -- posted at: 9:14am EST

In this podcast, Setta McCabe from WTCC 90.7 FM and Gordon talk about social media on her weekly radio program. During the show they discussed blogging, Twitter, Facebook, LinkedIn and other social media applications. This is a recording of the interview.

We’ve left Setta’s intro and exit pieces but have removed the public service announcements. Setta is great - and the interview was a lot of fun. We hope you enjoy listening.












Direct download: WTCC_Social_Media_Interview.mp3
Category:podcasts -- posted at: 11:45am EST

Intro: Apple says the tablet-style iPad computer represents a whole new category of consumer electronic devices. In this podcast Mike reviews the technical specifications of the device and gives his first impressions.


Let's start by looking at the Tech Specs of the new iPad


Size - How big is this thing?


The iPad is about 7 and a half inches wide; 9 and a half inches high; and a sleek looking 1/2 inch thick. There are two models one with WiFi only and the other with Wifi and 3G. The Wifi only model weighs 1.5 pounds - interestingly, the 3G radio adds another 10th of a pound.  


What about the hardware? Some people are referring to this thing as a big iPhone or iPod Touch?


On the surface, that would appear to be true, but as we'll discuss later, it's not that simple. The iPad has the same dock connector as the iPhone, so many of the existing accessories should still work. Also included are a headphone jack, speaker, microphone, and SIM card tray for the 3G model. The buttons replicate the iPhone (on/off, mute, volume up and down, and home).


What about the screen?


The screen is 9.7 inches diagonally, with a glossy fingerprint resistant coating. The screen is about the size of two iPhones stacked and oriented horizontally.The resolution is 1024 by 768 which amounts to 132 pixels per inch, compared to the iPhone, which is 480-by-320-pixels with a density of 163 ppi. The smaller density could result in losing some sharpness or clarity as text/objects are scaled up - although people who have used it rave about the display. And obviously, the screen supports multi-touch. 


What about capacity?


Following along the lines of the iPhone, the iPad is available with 16, 32 and 64 GB flash drives.


Does the iPad have senors like the iPhone?


Like the iPhone, the iPad contains a 3-axis accelerometer and an ambient light senor, which automatically adjusts the brightness of the display. The only sensor not present is the proximity sensor - but I don't expect people to hold this to their face to face call.


What about wireless?


As we already discussed, there are two models available (WiFi and WiFI+3G). The WiFi supports older 802.11a, b, and g standards, as well as the newer-faster 802.11n. The fact that it supports 802.11a leads me to believe that the 802.11n is dual-mode, meaning that it will support both 2.4 GHz and 5 GHz frequencies. The 3G - at least for now - is still AT&T's 3G, which theoretically could approach speeds of 7.2 Mbps (HSDPA). Unfortunately, AT&T's High-Speed Downlink Packet Access is not yet widely available. Probably in 2011.


What about other carriers?


There was a lot of speculation of this event including announcements regarding the end of AT&T exclusive iPhone deal and the addtion of other carriers - most notably Verizon Wireless. This may happen in time for the next version of the iPhone - in June or July. The iPad does use a micro-SIM card that you could swap with another carriers. It would of course have to be a GSM network. I think people also need to realize that a Verizon iPhone is not a technically insignificant task. Verizon's wireless network uses CDMA rather than GSM, which would require an entirely new phone with a CDMA-radio.




The iPad supports Bluetooth 2.1 +EDR (Enhanced Data Rate) which is a pretty speedy 3 MBps - at least compared to earlier 1MBps versions.I expect future versions of the iPad will eventually go to Bluetooh 3.0 +HS, which at 24 MBits will make the iPad the center of home entertainment and media systems - just a thought - no inside knowledge here.


What about GPS?


Unfortunately the iPad doesn't have a GPS radio. The WiFi -only model tries to use the location of wifi hotspots to triangulate location, while the WiFI+3G model supports assisted GPS and Cellular triangulation. Interestingly, like the iPhone 3GS, the iPad includes a digtial compass - personally, I would rather have GPS than a compass.


Battery Life?


As you know, Apple has been doing a lot to improve battery life on the MacBook and MacBook Pro line of laptops. It seems like some of this technology has made its way into the iPad, which they are rating at 10 hours (surfing the web with WiFI, watching videos, or listening to music). When people get these in their hands, I'm sure we'll see more realistic numbers - I would think in the 5-7 hour range.


What about the processor?


Here's where it gets interesting. In April of 2008, Apple purchased a small "boutique" microprocessor design company P.A. Semi.  Since that time, Apple has been able to use that new=found expertise to design and build a new 1GHz Apple A4 custom-designed, high-performance, low-power system-on-a-chip. Based on reports I've read on the speed and responsiveness of the system, this new chip has made a difference. It will be interesting to learn more about the actual chip, but I expect we'll see the same chip running in a new iPhone by June or July.


What about the software? 


The iPad seems to be running version 3.2 of the iPhone OS. The latest beta of the iPhone SDK is based on 3.2 and includes an iPad simulator. Since the iPad uses the iPhone OS, it is a closed ecosystem much like the iPhone - meaning you can't install any applications you want, as you might on a PC or traditional Mac computer. Instead you are dependent on the iPhone app store for app. Virtually all of the over 140,000 existing apps will run on the iPad - I would expect that apps that depend on iPhone-specific hardware (cellular radio, camera, GPS) will not run on an iPad. iPhone apps will run in native mode in a small window on the iPad and will include a 2x button, which will allow one to double the size of the app. Apple uses a technique call pixel-doubling to achieve this without losing the fidelity of the app. Developers can use the SDK to develop iPad-specific versions of their apps, which can take advantage of the increased screen real estate and will as the room to integrate more expansive multi-touch gestures. Apple demo re-written version of their iWork office suite (Keynote, Pages, and Numbers). These apps have been completely re-written with the iPad in mind and will be available for $10 each. The new apps look pretty slick!


What about what's missing?


Multi-tasking is something that many people were hoping for. Although it's not part of the 3.2 OS, some think it may be announced as part of iPhone OS 4.0 for a June/July launch. I wouldn't hold my breath. One of my students does multi-tasking on a jailbroken iPhone and tells me it kills the battery. 


In terms of hardware, there was lots of speculation about a front-facing webcam or even two cameras. I think a webcam for this sort of device makes sense - turns it into a great web conferencing device. A traditional iPhone-like camera doesn't make as much sense. Imagine trying trying to hold a 10x8 1.5 pound device and take photos - seems clunky. Developers reviewing the new beta (3.2) of the iPhone SDK have noticed references to a camera in the SDK, making it likely that a camera of some sort was planned for this device, but didn't make it into the final build. Some are hopeful that a camera will even show up when this product ships - that would be a nice surprise, but more likely, I think we'll see a front-facing camera in IPad 2.0. Additional speculation included 2 dock connectors, so the device could be docked in portrait or landscape - in the the end just one dock connector for portrait docking.


The iPad has no video out port, so there's a dock connector adapter available that purpose, as well as adapters for SD cards and USB devices. If you feel limited by text entry on a virtual keyboard, you can also purchase an optional dock with keyboard, and the iPad will purportedly be compatible with Apple's Bluetooth keyboard.


So, what do you think - is this going to go down in history as a revolutionary device?


I think it's unfortunate that there was so much hype surrounding this device. No device could live up to all those expectations. In my opinion, this seems today like an evolutionary device, but I think when we look back we will realize the revolutionary nature of the iPad. Clearly it will have all started with the iPhone, but I think the iPad is what Steve Jobs has been working toward all along - we saw a glimmer of that vision in the iPhone, but the iPad and its' successors are the full fruition of that vision. Fundamentally, what I think we're seeing is an inflection point in the historical arc of computing. I'll try to explain it, but I'm still working out the details myself. To date, if you wanted to use a computer, you had to immerse yourself in the details of filesystems, filetypes, settings, configuration, etc. While the hierarchy of files and folders serves as a good metaphor for navigating a computers contents and accessing applications, that GUI interface is sill just an extension of the command line we thought we left behind with DOS. What the iPhone introduced and the iPad now extends is a User Interface where files, folders, and the file system are all obfuscated - they all become abstractions that the generic user doesn't have to worry about or even be aware exist. Your mother and my mother don't want to be troubled by navigating a filesystem to find a document or an application - they just want to tap and run their application or open their document. As this paradigm shift moves forward, there will be users like me and you that will still want and need a filesystem, files and folders, but I think the average user will increasingly move toward this sort of simplified user interface. I've excerpted some interesting thoughts from a variety of pundits.


John Gruber makes the comparison between a car with a manual transmission and one with an automatic transmission:

Used to be that to drive a car, you, the driver, needed to operate a clutch pedal and gear shifter and manually change gears for the transmission as you accelerated and decelerated. Then came the automatic transmission. With an automatic, the transmission is entirely abstracted away. The clutch is gone. To go faster, you just press harder on the gas pedal. That’s where Apple is taking computing. A car with an automatic transmission still shifts gears; the driver just doesn’t need to know about it. A computer running iPhone OS still has a hierarchical file system; the user just never sees it.

Jim Stogdill build on Gruber's metaphor, comparing the iPad to the move from traditional autos to the Prius:

The automobile went through a similar evolution. From eminently hackable to hood essentially sealed shut. When the automobile was new, you HAD to be a mechanic to own one. Later, being a mechanic gave you the option of tinkering and adapting it to your specific interests. In fact, that's how most people up until about 1985 learned to be mechanics. The big changes came with the catalytic converter and electronic ignition (and warranty language to match). Now the automobile has reached the point in its development where you don't even have to know whether it has a motor or an engine to use it, but to tinker at all requires highly specialized skills.

one particularly telling phrase:

It's been a long time since most of us have used our computers to do anything approaching "computing," but the iPad explicitly leaves the baggage behind, leaps the conceptual gulf, and becomes something else entirely. Something consumery, media'ish, and not in the least bit intimidating.

Steven Frank discusses Old World versus New World computing and distills Apple's gambit into a few bullets:

The bet is roughly that the future of computing:

·       has a UI model based on direct manipulation of data objects

·       completely hides the filesystem from the user

·       favors ease of use and reduction of complexity over absolute flexibility

·       favors benefit to the end-user rather than the developer or other vendors

·       lives atop built-to-specific-purpose native applications and universally available web apps

Andy Ihnatko's hands-on with the iPad is also worth a read.



Category:podcasts -- posted at: 5:03pm EST

Maybe "decibel" is not part of your normal vocabulary but it is a term we all occasionally read or hear used. Typically it has to do with noise levels - we use decibels to describe loud or soft sounds. US government research even suggests a safe exposure sound limit of 85 decibels for eight hours a day. We frequently hear the term but - have you ever wondered what a "decibel" really is? We take a look in this podcast.
Direct download: What_The_Heck_Is_A_Decibel.mp3
Category:podcasts -- posted at: 3:33pm EST