Author Archives: lkeyes70

Sharing an inexpensive printer on the network


I had a request the other day, to share a Hewlett Packard All-In-One. I think the unit is a predecessor to the HP 2575. Inexpensive ($150.00), the unit prints with a color inkjet, and includes a scanner. It was the scanner in particular, that people wanted to share within the office, although they were also pleased at the idea of being able to print to a color printer.

When I hear about sharing a scanner, my first thought is to have them share a scanner on a networked copier. Imagistics and Xerox both have this option, and it works very well. But in this case, we had a cheap printer/scanner, that connected to a Windows XP desktop machine through a USB port.

The second idea would be to share the unit via the Windows XP sharing mechanism, to others on the network. This works reasonably well for sharing printers, but I was not aware that it would share the scanner function as well…absent some kind of networked scanner software and extra functionality built into the unit.

So I looked into networked scanners, and found a very nice HP Scanner for $400 or so which included networked scanning. But this was like hitting a tack with a sledgehammer.

We finally settled on a nifty device called the Keyspan USB Server. In their own words:

The USB Server makes it possible for USB printers, USB scanners and other USB devices to be used and shared across your network. It is ideal for home office, small office or classroom use!

The USB Server supports both Ethernet and Wi-Fi networks — making it easy to use USB devices from a Wi-Fi based laptop!

We attaching our little printer to this thing, installed the print drivers on each workstation and voila! instantly were able to scan to any workstation on the network.

If you’ve installed printer servers on a network, (like the Intel Netport) this is a similar kind of thing for USB devices. It requires a small memory-resident program to be present on each workstation which uses the device.

Recommended at $104.00 from Amazon.

Small Business Innovation Research Grants

We have been down a rabbit hole the past several weeks, working on our small business innovation grant (SBIR) application. This is a program which requires all U.S. agencies to send 2.5% of their budget for outside funding to U.S. small businesses. The program is in two phases: Phase I is nominally for $100,000 for six months, and Phase II is nominally for $750,000 and two years. However, it varies by agency. In our case, we are partnering with the local university, and indeed, the Uni received almost 80% of the funds from the Phase I grant. However, they also brought us the idea so we can’t complain too loudly. If your non-profit organization has a research project, and you need to subcontract the work to an outside company, the SBIR program might indeed be something to look at.

We were awarded a Phase I grant from the National Institutes of Health, Institute on Aging for our feasibility study on home-based telemedicine. The project involved installing a videoconferencing unit in our study subject’s homes, and conducting a home-based exercise class. Our target population were senior patients who had fallen or who had a fear of falling. We conducted a 15 week exercise class with two sets of study subjects, using multi-point video. We could see them and they could see us, and they could at times see each other, so it was very much like a “real” class.

We did pre and post testing of our subjects, and found, in general, that they improved their balance, strength, and well-being in ways that were similar to, or even better than similar subjects who participated in a live class. We’re now applying for a second phase grant, where we’ll do a formal controlled study to compare participants of a home class with those who participate in a live class.

This has been a real eye-opener to me, as the business partner, the boxes-and-wires guy, into the whole realm of scientific research, academic journals, the NIH, and US government funded research. What is interesting to me is that I had no idea of how this is really done, even though the public reads every week about some new drug study, or finding about drinking coffee, or the efficacy of osteoporosis drugs. Pick up a copy of Prevention magazine, or any of the Rodale publications like Bicycling or Men’s Health, and you’ll read about a clinical study which shows that ….blah blah blah.

SBIR grants cover all government agencies, not just NIH. EPA, Department of Defence, Department of Education, NOAA, NASA, all are required to participate in the SBIR program. Particularly in health care, education, and environmental studies, there might be a connection for your agency.

Screwed Again. What Happened to Net Neutrality?

A series of individual events may seem insignificant when viewed in isolation, but becomes highly significant when viewed together. Now that cable companies and telcos have consolidated their near monopoly status (again!), there are new attempts to “stratify” the internet.
The first report comes from Canada. Users there of the Shaw cable broadband service report that using Vonage has become difficult or impossible, and that Shaw is now attempting to charge an additional “quality of service” surchage of CDN $10.00/month for users who want Vonage service (which competes with a similar Shaw-provided Shaw Digital Phone). According to Shaw:

Quality of service issues do not apply to Shaw Digital Phone because Shaw Digital Phone operates on its own separate, managed network. Voice traffic distributed along this network is never shared with public Internet networks, so you can be confident Shaw Digital Phone will deliver the service reliability and performance you expect. As an added safeguard, Shaw Digital Phone includes its own QoS Enhancement feature.

Uhuh. However, it seems that plenty of people in the rest of the world have managed to have acceptable VoIP service using their standard broadband connections. We get 30-frame-per-second video for heaven’s sake. Furthermore, most calls are going to end up leaving the Shaw network anyway to be terminated at some other endpoint…putting the traffic on the internet regardless of the shaw “end-to-end separate managed network”. This sounds like a blatent attempt to dictate what users run on their broadband connection. More on this one at ipdemocracy.

The second example was a statement from Deutsche Telekom that internet content providers such as Google and Amazon should pay extra for super-fast internet access. This echoed similar statements made lately by BellSouth and AT&T.

Here’s what I don’t get: The entire success of the Internet has been predicated on equal access for everyone. That’s how startup companies like eBay and Amazon got going…and frankly that is how the Bell companies, who are merrily consolidating back into themselves, and the cable companies who are doing the same, managed to avoid bankruptcy. So why is this trend a good idea? What ever happened to the notion of a “common carrier” which separates the delivery medium from the content. As soon as my cable company starts providing me specialized content over my cable broadband connection, there is an inherent conflict of interest. And since most of the U.S. is already highly uncompetitive as far as broadband with one or at most two possible providers, we’re already paying monopolistic pricing, stuck with poor service, and living with blocked ports and bizarre useage restrictions.

Or as Doc Searles quotes Bob Frankston on the reemergence of the notion of net neutrality:

It’s simple.

The Internet has won. Why negotiate terms of surrender?

We mustn’t settle for negotiating “Net Neutrality”. We must demand the basic right to connect and not just an enumerated list of what we are allowed to do. It’s no different from having to negotiate free speech by listing what is allowed. Having to beg for permission to speak is offensive.

What we need is very simple: a recognition that Internet-style connectivity is our right as fundamental infrastructure just like the roads are. We can share them like the roads or power lines.

Back to my original idea…that taken separately these incidents may seem insignficant. But, look at the whole collapse of the 1996 telecom deregulation decision by the FCC. Remember CLECS? Competitive Local Exchange Carriers? They were squashed by the Bell operating companies.
If we’re not careful, the whole thing is going to happen again. And we’re going to end up with haves and have-nots, “tiered” services…120 channels and still nothing to watch.

How to open control panel folders from the command line

This is a link to a Microsoft Knowledgebase article on how to open control panel applications from the command line. For example


control netconnections
control userpasswords
control admintools

start the respective application for setting network connections, user passwords and viewing the administrator tools folder.

More on command line tools from the LabMice website.

SPAM Filters and eMail Etiquette

I just had what turned out to be a critical message from a new acquaintence get lost in my spam filter. There were at least three possible “triggers” that caused me to miss this eMail:

1. The return address has no identifier other than a single first name
2. The subject line was a single innocuous word that was virtually impossible to decode without opening the eMail
3. The eMail was an HTML eMail.

So, in my OutLook Inbox, (if it had gotten there)…the message would have looked like:

Sender

Subject

Received

Sent

Larry

TurtleDoveExploits

2/06/2006

2/06/2006

Ok, so the spam filter put this in the spam folder, and I looked at it… and debated whether to open it. Because, if you open up an eMail that is so-called “html” eMail, you can trigger further spam, or get a trojan or virus.
The good news is that I opened it, and it was from somebody I wanted to hear from. The bad news was the message was indeed an html message. Nice background stationary, lovely fonts…logo, and everything.

Suggestions:
Here are a couple suggestions from someone who gets a couple dozen eMails a day, and sometimes many more.

  1. Send mail as plain text, no background, no stationary. In OutLook this means not Rich Text, and not HTML mail.
  2. Be sure that your eMail is properly set up with complete first and last name, or company name in the sender’s name section of your eMail account properties. Send an eMail to yourself and see what it looks like, and if the eMail isn’t readily identifiable from the subject line, I guarantee that a lot of your eMail is going into the bit bucket, unread.
  3. Use subject lines that mean something. Refer to a previous communication, or to a relevant topic within the body of your eMail.

Maybe something like:

Sender

Subject

Received

Sent

U.S. Internal Revenue Service Kansas City Office

2005 Corporate 4th Quarter Tax Assessment

2/06/2006

2/06/2006

Dumb Programmers

With recent media scares about disk-eating viruses, security continues to be a pressing issue that appears to show only incremental improvement. My latest peeve:

Why are there still Windows applications written that require a local user account on a workstation that has administrator rights? I can cite three examples, at random:

1. The very popular Mavis Beacon Teaches Typing used to teach keyboarding skills. This application requires that the user account used to log into the computer be an admin account. This requires either that a separate student account be set up just to run this application…or that the student who is logged in can then create havoc on the workstation by downloading and installing all manner of spam/spyware/malware etc.

2. The Polycom PVX desktop videoconferencing software requires administrative rights for the user on the computer.

3. The AIM real-estate software from Stewart also requires admin rights.

The latter two applications are more likely to be found in a professional or corporate setting where you’d think that random html drive-bys would be less of a problem. Ahem.

We are all in this together. Dumb network administrators, dumb users, and dumb programmers. But you can’t blame the dumb administrators or the dumb users if the dumb programmers are too lazy to figure out how to allow their application to run with standard user credentials.

Control your startup through MS Antispyware

We have recommended Microsoft Antispyware
and I found a hidden gem under the covers, a startup manager. Using this screen, you can determine what processes and programs begin executing when you log into your user account. You can find this under the Tools|Advanced Tools|System Explorers menu selection.

This is a great way to clean up those egregious little update programs in the system tray. Quicktime, Logitech, Java updater, you name it. You’ll also find that your machine will usually start more quickly, and that you’ll have a little more memory for running the programs that you want to run.

For more on the topic, see the book Degunking Windows by Jeff Dunteman and Jolli Ballew.

Techno Lust: Phoenix Duet Speakerphone

I’ve had a very nice conversation with folks at Marratech, who make a web-based videoconferencing/whiteboard software client that runs on all platforms. In talking with them, I asked about how they did their audio echo canceling, and they suggested looking into the Phonix Duet speakerphone. Excerpts from review that appeared on the VoIPspeak site are posted below. Essentially, this is a device which provides echo cancellation and that allows you to avoid using a headset.

The Duet was designed from the ground up to work with voice over IP (VoIP) services such as Skype, Gizmo, and SoftPhones as well as Instant Message clients such as MSN Messenger, Yahoo! Messenger, and Google Talk. With proprietary Acoustic Echo Cancellation, Noise Suppression, and equalizer algorithms built in, the Duet PCS offers remarkably clean sound.

The first question you might ask is “who needs a business class speakerphone that plugs into a USB port?”. I actually had to think about that for a minute until I stopped to think about my own usage habits. To start off with, a USB sound device is much more efficient than using a soundcard for VoIP applications. With a soundcard you are using the processing power of the computer for the analog to digital conversion when the strength of a soundcard is not in its input, but rather than in its output abilitty. With a USB audio device, the device converts the audio into digital signals before sending it to the computer. This results in much better sound quality and compression which can have a dramatic efect on VoIP conversations. As a USB audio device, the Duet PCS not only functions as a speakerphone but also has a stadnard headset jack available essientially turning a standard headset into a high quality sound platform. Since it registers as an audio device, it is not specific to VoIP or IM applications, the noise reduction and echo cancelation make this device an excellent choice for podcasters as the recording quality is so good.

A PDF data sheet is located on the Phoenix site.

Chronicle: 2006 Technology Guide

The Chronicle of Philanthropy has published a 2006 Technology Guide with stories outlining some unusual and creative ways that NGOs are using technology. From the introduction:

  • A New York organization that provides low-cost technology aid to nonprofit groups is achieving another social goal: It trains low-income people and minorities to offer the technology services, giving them new job skills and paid empolyment
  • Unicef gets the word out about issues that affect children around the world by producing “podcasts”–radio broadcasts that can be downloaded free and listened to on portable audio devices.
  • Organizations tha deal with unpopular or sensitive causes are attracting a growing number of volunteers by using the Internet. In many cases, the groups are able to find people with far more expertise than the volunteers they were able to recruit in the past.

The Chron is subscription based.

Wireless Networking in the Developing World

This book is available as a free .PDF download.
From the web page description:

The massive popularity of wireless networking has caused equipment costs to continually plummet, while equipment capabilities continue to increase. By applying this technology in areas that are badly in need of critical communications infrastructure, more people can be brought online than ever before, in less time, for very little cost. We hope to not only convince you that this is possible, but also show how we have made such networks work, and to give you the information and tools you need to start a network project in your local community.