Followers

Powered by Blogger.
Wednesday, November 17, 2010

Microsoft Surface : the new Generation of multi touch Computer



Microsoft Surface is more than a computer. It’s a leap ahead in digital interaction. By enabling you to use your hands instead of a keyboard and mouse, it revolutionizes the way you interact with digital content, while keeping the ability to connect with other devices such as networks, printers, mobile devices, card readers, and more. Our Microsoft Surface Partners have created hundreds of applications for the platform.

Microsoft Surface is currently based on the Windows Vista platform, which makes it especially easy for companies to manage, deploy and support Microsoft Surface units. The current version for the software platform is Microsoft Surface 1.0 Service Pack 1, which enhances Surface with an enhanced user interface, improved manageability to help reduce the cost of ownership, broader international support, and faster, easier ways to design innovative applications. Read more about Service Pack 1 on the Microsoft Surface Blog.

The sophisticated camera system of Surface sees what is touching it and recognizes fingers, hands, paintbrushes, tagged objects and a myriad of other real-world items. It allows you to grab digital information and interact with the content through touch and gesture. And unlike other touch-screens, Surface recognizes many points of contact simultaneously, 52 to be exact. This allows multiple people to use Surface at the same time, creating a more engaging and collaborative computing experience than what is available via traditional personal computers, mobile devices, or public kiosks.

Tagged object recognition is a particularly innovative feature of Microsoft Surface. The tag is what lets Surface uniquely identify objects, helping the system tell the difference between two identical looking bottles of juice, for example. Applications can also use a tag to start a command or action, so simply placing a tagged object on the screen can open up a whole new experience. A tagged object might also identify a cardholder, so they can charge purchases or participate in a loyalty program. A tag can even tell Surface to display unique information about a tagged object, such as showing more information about a bottle of wine, the wine grower, the type of grape and vintage.

a Microsoft Surface unit is a PC that is running the Windows Vista Business operating system, so in some ways, a Surface unit is like a desktop computer or a server. The units include all of the standard manageability features that are available in Windows Vista to enable easy deployment and administration, including Windows Management Instrumentation (WMI), Remote Desktop Connection, Windows Scripting Host, Event Viewer, Performance Monitor, Event Forwarding, Task Scheduler, and so on. You can also use enterprise management tools like the Microsoft System Center family of products to deploy software, maintain patches, manage configuration, and monitor health.

You can also deploy Microsoft Surface units to remote locations away from the immediate reach of an IT administrator and then use remote management tools and scripting to accomplish administration tasks, such as taking a unit offline, installing applications, monitoring the unit, managing updates, and recovering the system.
Microsoft Surface represents a fundamental change in the way we interact with digital content. Leave the mouse and keyboard behind. Surface lets you grab digital content with your hands and move information with simple gestures and touches. Surface also sees and interacts with objects placed on the screen, allowing you to move information between devices like mobile phones or cameras. The result is a fun, social and exciting computing experience like you’ve never had before.

Microsoft Surface has four key capabilities that make it such a unique experience:

* Direct interaction. Users can grab digital information with their hands and interact with content on-screen by touch and gesture – without using a mouse or keyboard.
* Multi-user experience. The large, horizontal, 30 inch display makes it easy for several people to gather and interact together with Microsoft Surface - providing a collaborative, face-to-face computing experience.
* Multi-touch. Microsoft Surface responds to many points of contact simultaneously - not just from one finger, as with a typical touch screen, but from dozens of contact points at once.
* Object recognition. Users can place physical objects on the screen to trigger different types of digital responses – providing for a multitude of applications and the transfer of digital content to mobile devices.

Microsoft Surface uses cameras and image recognition in the infrared spectrum to recognize different types of objects such as fingers, tagged items and shapes. This input is then processed by the computer and the resulting interaction is displayed using rear projection. The user can manipulate content and interact with the computer using natural touch and hand gestures, instead of a typical mouse and keyboard.
Monday, November 15, 2010

Enable Internet Connection Firewall using VBScript

Windows Firewall helps to protect computers from unsolicited network traffic. The Windows Firewall APIs make it possible to programmatically manage the features of Windows Firewall by allowing applications to create, enable, and disable firewall exceptions.
Windows Firewall API is intended for situations in which a software application or setup program must operate with adjustments to the configuration of the networking environment in which it runs. For example, a service that needs to receive unsolicited traffic can use this API to create exceptions that allow the unsolicited traffic.
Windows Firewall API is designed for use by programmers using C/C++, Microsoft Visual Basic development system, Visual Basic Scripting Edition, and JScript development software. Programmers should be familiar with networking concepts such as stateful packet filtering, TCP/IP protocol concepts, and network address translation (NAT).
Windows Firewall API is supported on Windows XP with Service Pack 2 (SP2). For more specific information about which operating systems support a particular programming element, refer to the Requirements sections in the documentation.

[Internet Connection Firewall may be altered or unavailable in subsequent versions. Instead, use the Windows Firewall API.
The following VBScript code first determines if Internet Connection Sharing and Internet Connection Firewall are available on the local computer. If so, the code enumerates the connections on the local computer, and enables Internet Connection Firewall on the connection that is specified as a command line argument.


' Copyright (c) Microsoft Corporation. All rights reserved.

OPTION EXPLICIT

DIM ICSSC_DEFAULT, CONNECTION_PUBLIC, CONNECTION_PRIVATE, CONNECTION_ALL
DIM NetSharingManager
DIM PublicConnection, PrivateConnection
DIM EveryConnectionCollection

DIM objArgs
DIM con

ICSSC_DEFAULT = 0
CONNECTION_PUBLIC = 0
CONNECTION_PRIVATE = 1
CONNECTION_ALL = 2

Main( )

sub Main( )
Set objArgs = WScript.Arguments

if objArgs.Count = 1 then
con = objArgs(0)

WScript.Echo con

if Initialize() = TRUE then
GetConnectionObjects()

FirewallTestByName(con)
end if
else
DIM szMsg
szMsg = "Invalid usage! Please provide the name of the connection as the argument." & chr(13) & chr(13) & _
"Usage:" & chr(13) & _
" " + WScript.scriptname + " " + chr(34) + "Connection Name" + chr(34)
WScript.Echo( szMsg )
end if

end sub


sub FirewallTestByName(conName)
on error resume next
DIM Item
DIM EveryConnection
DIM objNCProps
DIM szMsg
DIM bFound

bFound = false
for each Item in EveryConnectionCollection
set EveryConnection = NetSharingManager.INetSharingConfigurationForINetConnection(Item)
set objNCProps = NetSharingManager.NetConnectionProps(Item)
if (ucase(conName) = ucase(objNCProps.Name)) then
szMsg = "Enabling Firwall on connection:" & chr(13) & _
"Name: " & objNCProps.Name & chr(13) & _
"Guid: " & objNCProps.Guid & chr(13) & _
"DeviceName: " & objNCProps.DeviceName & chr(13) & _
"Status: " & objNCProps.Status & chr(13) & _
"MediaType: " & objNCProps.MediaType

WScript.Echo(szMsg)
bFound = true
EveryConnection.EnableInternetFirewall
exit for
end if
next

if( bFound = false ) then
WScript.Echo( "Connection " & chr(34) & conName & chr(34) & " was not found" )
end if

end sub

function Initialize()
DIM bReturn
bReturn = FALSE

set NetSharingManager = Wscript.CreateObject("HNetCfg.HNetShare.1")
if (IsObject(NetSharingManager)) = FALSE then
Wscript.Echo("Unable to get the HNetCfg.HnetShare.1 object")
else
if (IsNull(NetSharingManager.SharingInstalled) = TRUE) then
Wscript.Echo("Sharing isn't available on this platform.")
else
bReturn = TRUE
end if
end if
Initialize = bReturn
end function

function GetConnectionObjects()
DIM bReturn
DIM Item

bReturn = TRUE

if GetConnection(CONNECTION_PUBLIC) = FALSE then
bReturn = FALSE
end if

if GetConnection(CONNECTION_PRIVATE) = FALSE then
bReturn = FALSE
end if

if GetConnection(CONNECTION_ALL) = FALSE then
bReturn = FALSE
end if

GetConnectionObjects = bReturn

end function


function GetConnection(CONNECTION_TYPE)
DIM bReturn
DIM Connection
DIM Item
bReturn = TRUE

if (CONNECTION_PUBLIC = CONNECTION_TYPE) then
set Connection = NetSharingManager.EnumPublicConnections(ICSSC_DEFAULT)
if (Connection.Count > 0) and (Connection.Count < 2) then
for each Item in Connection
set PublicConnection = NetSharingManager.INetSharingConfigurationForINetConnection(Item)
next
else
bReturn = FALSE
end if
elseif (CONNECTION_PRIVATE = CONNECTION_TYPE) then
set Connection = NetSharingManager.EnumPrivateConnections(ICSSC_DEFAULT)
if (Connection.Count > 0) and (Connection.Count < 2) then
for each Item in Connection
set PrivateConnection = NetSharingManager.INetSharingConfigurationForINetConnection(Item)
next
else
bReturn = FALSE
end if
elseif (CONNECTION_ALL = CONNECTION_TYPE) then
set Connection = NetSharingManager.EnumEveryConnection
if (Connection.Count > 0) then
set EveryConnectionCollection = Connection
else
bReturn = FALSE
end if
else
bReturn = FALSE
end if

if (TRUE = bReturn) then

if (Connection.Count = 0) then
Wscript.Echo("No " + CStr(ConvertConnectionTypeToString(CONNECTION_TYPE)) + " connections exist (Connection.Count gave us 0)")
bReturn = FALSE
'valid to have more than 1 connection returned from EnumEveryConnection
elseif (Connection.Count > 1) and (CONNECTION_ALL <> CONNECTION_TYPE) then
Wscript.Echo("ERROR: There was more than one " + ConvertConnectionTypeToString(CONNECTION_TYPE) + " connection (" + CStr(Connection.Count) + ")")
bReturn = FALSE
end if
end if
Wscript.Echo(CStr(Connection.Count) + " objects for connection type " + ConvertConnectionTypeToString(CONNECTION_TYPE))

GetConnection = bReturn
end function

function ConvertConnectionTypeToString(ConnectionID)
DIM ConnectionString

if (ConnectionID = CONNECTION_PUBLIC) then
ConnectionString = "public"
elseif (ConnectionID = CONNECTION_PRIVATE) then
ConnectionString = "private"
elseif (ConnectionID = CONNECTION_ALL) then
ConnectionString = "all"
else
ConnectionString = "Unknown: " + CStr(ConnectionID)
end if

ConvertConnectionTypeToString = ConnectionString
end function






Thursday, November 11, 2010

Download, Install and Run the Android Emulator


In this tutorial we are going to learn how to install any given Android application in Android emulator. i will help you to setup the android 1.1 and 1.5 emulator.

You must have java installed on your machine before installing the Android emulator.

Install Java from here: Go to java.com and install to java.

If you already installed java or recently then you must know that the version of Java installed on your machine is correct or not.

Test installed java from here: Go java.com to check whether you have correct version of java installed or not. If you fine that correct version is not installed then follow the instruction provided in page and install the correct version of java.

After completion of java installation successfully follow below steps to install the Android emulator.


download the android emulator

Android emulator comes with Android sdk.You can download latest sdk from:android.com

How to install android emulator

Downloaded android sdk will be in compressed format.Uncompressed it to the desired location [e.g. C:\Emulator]and you are done.

Android sdk commands for emulator

Launch the command prompt: Start>Run>Cmd.Locate the emulator.exe path where the android got installed, in this case go to C:\Emulator directory and navigate to tools directory e.g:C:\Emulator\Android\android-sdk-windows-1.5_r2\tools where emulator.exe is present.Navigate to tools directory path in command prompt like shown below.

Type: Emulator.exe -help and execute it. You will find the list of the useful commands related to emulator usage.

* Type: Android -h and execute it. You will find the list of the useful commands related to Android usage.

android virtual device

Android virtual device is the emulator that we are going to create based on the specific platform of android
.E.g. Android1.1, Abdroid1.5, Android2.0 etc.

* Type: Emulator.exe -help-virtual-device and execute it for more information about android virtual device.

setup the Android virtual device

This is the command format to create the android virtual device: android create avd -n [UserDefinedNameHere] -t [1 or 2 or 3 etc. based on which android platform you want to create]

* If you want to create android virtual device based on Android1.1 platform then type:android create avd -n MyAndroid1 -t 1
* If you want to create android virtual device based on Android1.5 platform then type:android create avd -n MyAndroid2 -t 2
* After executing one of the above command you will be prompted for the message like below to create custom hardware profile. Type no if you don't want to create custom hardware profile.

* Now after successful setup of android virtual device you will be prompted message like this depending on what platform android virtual device is created:"Created AVD 'MyAndroid1' based on Android1.1 or Created AVD 'MyAndroid2' based on Android1.5"

list of created android virtual devices

Type: Android list avd : This command will display the list of the created android virtual devices as shown in below screen shot.

launch created android virtual device or emulator

A: Type:emulator.exe -avd [name of the emulator created] : In our case type:emulator.exe -avd MyAndroid1 or emulator.exe -avd MyAndroid2

Now you can see the emulator launched as below. Wait some time to get it initialized , ignore any error message if it appears if it is not blocking,It will also get the Internet connection automatically so you do not need to do anything to surf Internet in emulator. Now you are ready to start you application on emulator !

Tuesday, November 9, 2010

VoIP System Standart Features

Voice over IP (VoIP) systems today are gaining in popularity today for several reasons, most notable are the availability of so many open source and commercial options, the high degree of available interface devices that allow you to connect to existing circuit based networks and hardware, and the ability to create full end to end IP based solutions using available high-speed links or gateways with commercial trunk providers. However, it is still easy to make a poor purchasing decision unless you take a good look at the basic requirements of what a communication system needs to provide to be effective in your business and help you achieve your cost savings while still maintaining your ability to be connected to your clients and vendors in an effective manner. My intent here is to help outline the 5 standard features that your VoIP system should have for it to be considered the proper solution for your enterprise.

Examination

Standardization and Flexibility

Just like Henry Ford grew the automobile business based upon the obvious concept of standardization, the VoIP industry gained its recent focus and popularity based upon the same ideals. Gone are the days of having to select and architect a solution based upon the supported protocols of one vendor and become locked in. The two major signaling protocols you will see today, H.323 and SIP are the largest players, with H.323 starting to lag behind as SIP gains in popularity and support, more compliant vendors, and continued enhanced to support more media streams and tighter device integration that up until recently has been what was keeping H.323 ahead in the game. Keeping in mind that H.323 is still the more mature technology, currently it is holding its ground in the carrier space and is used quite extensively as a trunk side protocol. This has allowed SIP to comfortably gain foothold in the enterprise space as a local carrier style protocol that is simpler to implement, troubleshoot, and extend with new features as needed. It is clear that for a system to be considered future proof it has to support the currently prevalent standards but also allow ‘plug ability’ and offer support for emerging standards, or alterations to the existing standards as well.

Integration Options

Unless you are starting from scratch you are most likely attempting to integrate a VoIP option into your existing infrastructure as part of a phased deployment strategy. The current list of options to accomplish this is growing longer and longer every day, and that has many benefits for the consumer with regards to architecture, cost, interoperability options, and the quicker movement to tighter standards compliance between vendors. There is no longer a need to consider the move to VoIP to be an all or nothing deal with the introduction of gateway devices that allow you to leverage your current investment in older TDM based equipment and enhance it with the newer IP based messaging solutions. Doing this allows you to add new devices to the newer IP network while maintaining a rich level of integration with the legacy TDM equipment until it lives out its natural (and still depreciable) life span.

Security

As with everything today, security is a huge consideration when you start to think about moving to VoIP. If it is not something that you have already though about, or your vendor has not discussed it deeply with you then I urge you to stop reading this right now, go to your vendor and ASK how secure your current VoIP implementation (or the one you are planning to install) is.

Security is so critical in today’s business market, but because people have felt so safe in the past using TDM voice infrastructures where ‘tapping’ meant actually making a physical connection to the ‘wires’, the thought of security quite often eludes people when you starting the talk about VoIP. It is so easy to fire up a copy of Wireshark on your network, collect some packets, and use the tools built right into the GUI to listen to VoIP conversations. So, what do you do? The answer is simple. You turn on encryption and ensure that every device you use within in your IP infrastructure involved in the call supports the encryption scheme that you pick. Keep in mind that while encryption is good, it does add CPU load to your devices, can cause higher network utilization because the packets can get larger, and can add complexity to any troubleshooting efforts, but you should NOT implement any VoIP system without taking security into consideration. One fine option that I have used is to consider your internal network to be secure and just encrypt the calls that pass via IP between external parties (over your IP based trunks if you use them) or between all your company locations using the public IP network. It’s my feeling that as long as you keep your internal IP infrastructure secure (IE: tight controls on who can enter your IT area, and you are using switches rather than hubs), bothering to encrypt internal IP connections is not always needed because in a properly configured environment you will not be able to capture VoIP data other than what is directed to you. If you are using hubs then all bets are off of course. That is a subject for another article.

Support

As with most other technologies, part of your purchasing and deployment planning MUST be to take the support model into consideration. Don’t just assume that your existing vendor that supports your current internet connection to the external world is going to be there if you have IP trunk problems, understand what terminology like QoS, jitter, and other VoIP lingo means, or even how to correct them if problems occur. As when introducing any new technology you need to have a sit-down with everyone involved in the proposed value chain and establish an understanding of expectations, possible support needs, costs, and schedules. You may find out that your provider is by default blocking the native ports that the typical VoIP protocols require simply because they are not used to requiring them to be open for other clients. If you are ready to move to IP for your voice communications just understand that while you may have been willing to put up with slowness in the afternoons when you tried to use the web to order your dinner so you could pick it up on the way home, a slow data connection can wreak havoc with voice quality and the ability to establish a call. You may need to consider a separate IP connection just dedicated to voice, and in fact you may need to start considering redundant connections using two different providers for your voice if you have not already done so for your data. Additionally, ensure that your vendor has the proper debugging tools in place, knows how to use them, and is willing to offer training to your staff, or that you are willing to use third parties to get them trained, so that they can be used to keep the system running in top condition. Remember that voice communication is still considered a top priority in today’s business world and loosing that, even for a few hours, can make a customer start looking for someone to replace you as a vendor.

Extension Points

Many people today are used to just using the phone to talk, or maybe send faxes, but once the move to IP is made the benefits will start to bring on questions about other methods of application integration, and additional ways to leverage the new communications system. One thing that you should always consider on any new system, not just VoIP, are ways that you can utilize it going forward for things other than just your current needs. A car would not be much use if you could only drive it back and forth to work would it? The same goes for your telephony solution. Right from the start you should consider investigating the extension areas of all the solutions you look at and at least gain an understanding of the features and benefits that each system may or may not offer. For example, it could be very disappointing to get a system all in place and six months latter determine that you still need to add a bank of analog trunk lines to and receive faxes because your solution did not include the ability for Fax over IP (FoIP) codecs. Making blanket assumptions like ‘just because traditional faxes use our existing voice lines the VoIP system should also do fax’ can lead to some very tense moments across a boardroom table. Also consider integration with other areas like Instant Messaging (IM) and application integration such as the ability to build basic Interactive Voice Response (IVR) menus (IE: ‘To talk to support, please press 1, to talk to sales, please press 2,…) into the system and create simple auto attendant applications. These simple features can help add some great value that may not have been considered previously, and allow you to recoup the costs of a VoIP implementation over a shorter timeline than previously anticipated. Areas like this can allow you to bring systems together under one area and thus cut down the size of your external vendor list.
Conclusion

As you can see, the move to VoIP is fraught with decisions, technical considerations, and even some simple human capital management opportunities, but the gains in productivity, efficiency, and the ability to leverage existing infrastructure and gain some valuable benefits in the areas of long term manageability, application integration, multi-modal communications options and simpler to manage infrastructure far outweigh the potential problems as long as the map forward is well thought out and planned. As with most IT based business decisions it is always good to ensure that everyone understands the possible features and benefits as well as the potential risks and how they can be mitigated to derive the value that is expected.

Disclosures and References

As part of my previous experience in VoIP technology I spent 10 years as a product and training specialist working for both Intel Corporation and Dialogic Corporation in the area of Digital PBX TDM to IP interfacing with regards to the Netstructure PBX/IP Media gateway product line. In addition, my secondary focus was working closely with vendors offering tightly integrated VoIP solutions such as Microsoft Exchnage Unified Messaging and IBM Lotus Sametime using these devices as well as the design and development of product training classes, certification programs for user and administrative positions, and product documentation collateral.

Sunday, November 7, 2010

Increase Visitor Traffic for your website

Increase website traffic is one of the most important point to grow up your site.If you have a website—especially one you want to monetize—this is undoubtedly a question you’ve asked yourself. Often, the single biggest impact on the level of web traffic your site gets is its search engine page ranking or SERP. Major search engines like Yahoo!, Google, Ask, and MSN, however, choose to add some intrigue to the pursuit of rising up the search engine results page (SERP) ladder by keeping the majority of their metrics a secret. The resulting effect leaves the webmaster and search community with the daunting task of sifting through rumors and experience to shorten the slog through massive amounts of trial and error needed to figure out what really works.

But fear not good people of the internet! There is hope on the horizon yet. Lucky for all of us there are more people with great ideas and ambition trying to solve the riddles than there are riddle masters holding us back. Thanks to these internet superheroes much of the mystery that shrouds effective search engine marketing has been lifted, and what we are left with is a much clearer picture of what works and what does not.

Choose the Right Blog Software, The right blog CMS makes a big difference. If you want to set yourself apart, I recommend creating a custom blog solution - one that can be completely customized to your users. In most cases, WordPress, Blogger, MovableType or Typepad will suffice, but building from scratch allows you to be very creative with functionality and formatting. The best CMS is something that's easy for the writer(s) to use and brings together the features that allow the blog to flourish. Think about how you want comments, archiving, sub-pages, categorization, multiple feeds and user accounts to operate in order to narrow down your choices. OpenSourceCMS is a very good tool to help you select a software if you go that route.

Host Your Blog Directly on Your Domain, Hosting your blog on a different domain from your primary site is one of the worst mistakes you can make. A blog on your domain can attract links, attention, publicity, trust and search rankings - by keeping the blog on a separate domain, you shoot yourself in the foot. From worst to best, your options are - Hosted (on a solution like Blogspot or Wordpress), on a unique domain (at least you can 301 it in the future), on a subdomain (these can be treated as unique from the primary domain by the engines) and as a sub-section of the primary domain (in a subfolder or page - this is the best solution).

Write Title Tags with Two Audiences in Mind, First and foremost, you're writing a title tag for the people who will visit your site or have a subscription to your feed. Title tags that are short, snappy, on-topic and catchy are imperative. You also want to think about search engines when you title your posts, since the engines can help to drive traffic to your blog. A great way to do this is to write the post and the title first, then run a few searches at Overture, WordTracker & KeywordDiscovery to see if there is a phrasing or ordering that can better help you to target "searched for" terms.

Participate at Related Forums & Blogs, Whatever industry or niche you're in, there are bloggers, forums and an online community that's already active. Depending on the specificity of your focus, you may need to think one or two levels broader than your own content to find a large community, but with the size of the participatory web today, even the highly specialized content areas receive attention. A great way to find out who these people are is to use Technorati to conduct searches, then sort by number of links (authority). Del.icio.us tags are also very useful in this process, as are straight searches at the engines (Ask.com's blog search in particular is of very good quality).

Tag Your Content, Technorati is the first place that you should be tagging posts. I actually recommend having the tags right on your page, pointing to the Technorati searches that you're targeting. There are other good places to ping - del.icio.us and Flickr being the two most obvious (the only other one is Blogmarks, which is much smaller). Tagging content can also be valuable to help give you a "bump" towards getting traffic from big sites like Reddit, Digg & StumbleUpon (which requires that you download the toolbar, but trust me - it's worth it). You DO NOT want to submit every post to these sites, but that one out of twenty (see tactic #18) is worth your while.

Launch Without Comments, There's something sad about a blog with 0 comments on every post. It feels dead, empty and unpopular. Luckily, there's an easy solution - don't offer the ability to post comments on the blog and no one will know that you only get 20 uniques a day. Once you're upwards of 100 RSS subscribers and/or 750 unique visitors per day, you can open up the comments and see light activity. Comments are often how tech-savvy new visitors judge the popularity of a site (and thus, its worth), so play to your strengths and keep your obscurity private.

Don't Jump on the Bandwagon, Some memes are worthy of being talked about by every blogger in the space, but most aren't. Just because there's huge news in your industry or niche DOES NOT mean you need to be covering it, or even mentioning it (though it can be valuable to link to it as an aside, just to integrate a shared experience into your unique content). Many of the best blogs online DO talk about the big trends - this is because they're already popular, established and are counted on to be a source of news for the community. If you're launching a new blog, you need to show people in your space that you can offer something unique, different and valuable - not just the same story from your point of view. This is less important in spaces where there are very few bloggers and little online coverage and much more in spaces that are overwhelmed with blogs (like search, or anything else tech-related).

Link Intelligently, When you link out in your blog posts, use convention where applicable and creativity when warranted, but be aware of how the links you serve are part of the content you provide. Not every issue you discuss or site you mention needs a link, but there's a fine line between overlinking and underlinking. The best advice I can give is to think of the post from the standpoint of a relatively uninformed reader. If you mention Wikipedia, everyone is familiar and no link is required. If you mention a specific page at Wikipedia, a link is necessary and important. Also, be aware that quoting other bloggers or online sources (or even discussing their ideas) without linking to them is considered bad etiquette and can earn you scorn that could cost you links from those sources in the future. It's almost always better to be over-generous with links than under-generous. And link condoms? Only use them when you're linking to something you find truly distasteful or have serious apprehension about.

Invite Guest Bloggers, Asking a well known personality in your niche to contribute a short blog on their subject of expertise is a great way to grow the value and reach of your blog. You not only flatter the person by acknowledging their celebrity, you nearly guarantee yourself a link or at least an association with a brand that can earn you readers. Just be sure that you really are getting a quality post from someone that's as close to universally popular and admired as possible (unless you want to start playing the drama linkbait game, which I personally abhor). If you're already somewhat popular, it can often be valuable to look outside your space and bring in guest authors who have a very unique angle or subject matter to help spice up your focus. One note about guest bloggers - make sure they agree to have their work edited by you before it's posted. A disagreement on this subject after the fact can have negative ramifications.

Eschew Advertising, Usually, I ignore adsense, but I also cast a sharp eye towards the quality of the posts and professionalism of the content when I see AdSense. That's not to say that contextual advertising can't work well in some blogs, but it needs to be well integrated into the design and layout to help defer criticism. Don't get me wrong - it's unfair to judge a blog by its cover (or, in this case, its ads), but spend a lot of time surfing blogs and you'll have the same impression - low quality blogs run AdSense and many high quality ones don't. I always recommend that whether personal or professional, you wait until your blog has achieved a level of success before you start advertising. Ads, whether they're sponsorships, banners, contextual or other, tend to have a direct, negative impact on the number of readers who subscribe, add to favorites and link - you definitely don't want that limitation while you're still trying to get established.

Go Beyond Text in Your Posts, Blogs that contain nothing but line after line of text are more difficult to read and less consistently interesting than those that offer images, interactive elements, the occasional multimedia content and some clever charts & graphs. Even if you're having a tough time with non-text content, think about how you can format the text using blockquotes, indentation, bullet points, etc. to create a more visually appealing and digestible block of content.

Cover Topics that Need Attention, In every niche, there are certain topics and questions that are frequently asked or pondered, but rarely have definitive answers. While this recommendation applies to nearly every content-based site, it's particularly easy to leverage with a blog. If everyone in the online Nascar forums is wondering about the components and cost of an average Nascar vehicle - give it to them. If the online stock trading industry is rife with questions about the best performing stocks after a terrorist threat, your path is clear. Spend the time and effort to research, document and deliver and you're virtually guaranteed link-worthy content that will attract new visitors and subscribers.

Pay Attention to Your Analytics, Visitor tracking software can tell you which posts your audience likes best, which ones don't get viewed and how the search engines are delivering traffic. Use these clues to react and improve your strategies. Feedburner is great for RSS and I'm a personal fan of Indextools. Consider adding action tracking to your blog, so you can see what sources of traffic are bringing the best quality visitors (in terms of time spent on the site, # of page views, etc). I particularly like having the "register" link tagged for analytics so I can see what percentage of visitors from each source is interested enough to want to leave a comment or create an account.

Use a Human Voice, Charisma is a valuable quality, both online and off. Through a blog, it's most often judged by the voice you present to your users. People like empathy, compassion, authority and honesty. Keep these in the forefront of your mind when writing and you'll be in a good position to succeed. It's also critical that you maintain a level of humility in your blogging and stick to your roots. When users start to feel that a blog is taking itself too seriously or losing the characteristics that made it unique, they start to seek new places for content. We've certainly made mistakes (even recently) that have cost us some fans - be cautious to control not only what you say, but how you say it. Lastly - if there's a hot button issue that has you posting emotionally, temper it by letting the post sit in draft mode for an hour or two, re-reading it and considering any revisions. With the advent of feeds, once you publish, there's no going back.

Archive Effectively, The best archives are carefully organized into subjects and date ranges. For search traffic (particularly long tail terms), it can be best to offer the full content of every post in a category on the archive pages, but from a usability standpoint, just linking to each post is far better (possibly with a very short snippet). Balance these two issues and make the decision based on your goals. A last note on archiving - pagination in blogging can be harmful to search traffic, rather than beneficial (as you provide constantly changing, duplicate content pages). Pagination is great for users who scroll to the bottom and want to see more, though, so consider putting a "noindex" in the meta tag or in the robots.txt file to keep spiders where they belong - in the well-organized archive system.

Implement Smart URLs, The best URL structure for blogs is, in my opinion, as short as possible while still containing enough information to make an educated guess about the content you'll find on the page. I don't like the 10 hyphen, lengthy blog titles that are the byproduct of many CMS plugins, but they are certainly better than any dynamic parameters in the URL. Yes - I know I'm not walking the talk here, and hopefully it's something we can fix in the near future. To those who say that one dynamic parameter in the URL doesn't hurt, I'd take issue - just re-writing a ?ID=450 to /450 has improved search traffic considerably on several blogs we've worked with.

Reveal as Much as Possible, The blogosphere is in love with the idea of an open source world on the web. Sharing vast stores of what might ordinarily be considered private information is the rule, rather than the exception. If you can offer content that's usually private - trade secrets, pricing, contract issues, and even the occasional harmless rumor, your blog can benefit. Make a decision about what's off-limits and how far you can go and then push right up to that limit in order to see the best possible effects. Your community will reward you with links and traffic.

Only One Post in Twenty Can Be Linkbait, Not every post is worthy of making it to the top of Digg, Del.icio.us/popular or even a mention at some other blogs in your space. Trying to over-market every post you write will result in pushback and ultimately lead to negative opinions about your efforts. The less popular your blog is, the harder it will be to build excitement around a post, but the process of linkbait has always been trial and error - build, test, refine and re-build. Keep creating great ideas and bolstering them with lots of solid, everyday content and you'll eventually be big enough to where one out of every 20-40 posts really does become linkbait.

Make Effective Use of High Traffic Days, If you do have linkbait, whether by design or by accident, make sure to capitalize. When you hit the front page of Digg, Reddit, Boing Boing, or, on a smaller scale, attract a couple hundred visitors from a bigger blog or site in your space, you need to put your best foot forward. Make sure to follow up on a high traffic time period with 2-3 high quality posts that show off your skills as a writer, your depth of understanding and let visitors know that this is content they should be sticking around to see more of. Nothing kills the potential linkbait "bump" faster than a blog whose content doesn't update for 48 hours after they've received a huge influx of visitors.

Create Expectations and Fulfill Them, When you're writing for your audience, your content focus, post timing and areas of interest will all become associated with your personal style. If you vary widely from that style, you risk alienating folks who've come to know you and rely on you for specific data. Thus, if you build a blog around the idea of being an analytical expert in your field, don't ignore the latest release of industry figures only to chat about an emotional issue - deliver what your readers expect of you and crunch the numbers. This applies equally well to post frequency - if your blog regularly churns out 2 posts a day, having two weeks with only 4 posts is going to have an adverse impact on traffic. That's not to say you can't take a vacation, but you need to schedule it wisely and be prepared to lose RSS subscribers and regulars. It's not fair, but it's the truth. We lose visitors every time I attend an SES conference and drop to one post every two days.

Build a Brand, Possibly one of the most important aspects of all in blogging is brand-building. As Zefrank noted, to be a great brand, you need to be a brand that people want to associate themselves with and a brand that people feel they derive value from being a member. Exclusivity, insider jokes, emails with regulars, the occasional cat post and references to your previous experiences can be off putting for new readers, but they're solid gold for keeping your loyal base feeling good about their brand experience with you. Be careful to stick to your brand - once you have a definition that people like and are comfortable with, it's very hard to break that mold without severe repercussions. If you're building a new blog, or building a low-traffic one, I highly recommend writing down the goals of your brand and the attributes of its identity to help remind you as you write.

Best of luck to all you bloggers out there. It's an increasingly crowded field to play in, but these strategies should help to give you an edge over the competition. As always, if you've got additions or disagreements, I'd love to hear them.

Friday, November 5, 2010

Optimize Adsense Keywords and Earning

Adsense from Google Adsense provides an easy opportunity for bloggers and webmasters to earn revenue from their hard work. To make significant money from your website or blog, the trick is to find the right way to deploy Adsense.

Simply cutting and pasting the Adsense code on to your web pages will not be enough. Try out variations of advert page placements and advert formats. To find the right layout that maximizes Adsense revenue usually takes a while.

One of the keys to a good Adsense click-through rate is to make sure that the ads served are relevant to your website visitors. if the goods and services offered by your advertisers are irrelevant then your visitors will not be interested in visiting their sites. make sure your content is relevant and is targeted at a narrow selection of related topics. Your meta tag keywords must reflect the content of your website.

There are numerous successful methods for increasingAdsense money. A great tip is to place the Adsense adverts on page ‘hotspots’. the top left of a web page is well known to be an effective zone on which to place advertisements. the reason for this is that we all read from top to bottom and from left to right.

Another excellent Google Adsense tip is to locate adverts on your pages with the highest traffic. decide which are the best pages by monitoring your web statistics and locating the main visitor entry pages.

Your Adsense ads should blend in with the rest of your web page. this generally makes the adverts seem like a natural part of your site, and will reassure your visitors and make the site look more professional. Adsense allow website developers with content centric websites to add a substantial revenue stream to their site by adding contextual advertising, which can generate revenue from few pennies a day to thousands of dollars per month.

Some of the websites like Iotaweb.org helps the visitors to search for keywords and key phrases which can produce high dollar contextual advertising. There are approximately 360 Google Adsense Top paying Keywords starting with letter A. Keywords on Google are sorted by highest average CPS. Some of the main keywords are: adverse credit remortgages, at call conference, angeles drug los rehab, at go and so on.

The formula for success is (# of Visitors) X (Click thru %) X (Ad value) = Income.

By what means ads can be created on Google? The process is simple, you create ads and choose keywords, which are words or phrases related your business. When a visitor searches on Google using one of your keywords, your ad may appear next to the search results. You are actually advertising to an audience or the visitor that’s already interested in you.

Visitors simply click your ad to make a purchase or learn more about your product. Actually you don’t even need a webpage to get started – Google helps in creating one for you free of cost.

One can find numerous keyword research tools. Keyword Country is considered to be the most comprehensive and most complete keyword research tool. It connects to major engines for keyword research including Google, MSN, Yahoo, ASK. It steals all the niche keywords that the industry happens to be focusing on.

Its software Google Adsense KeywordGoogle is one of the maximum earning search engines.

With this you can access to:

a) Most profitable High paying Keywords

b) Traffic building keywords

c) High CTR keywords

d) Thousands of Niche keywords from almost 600,000 markets online

e) Increase website traffic, build more content and study the behavior of keywords

Since your aim is to earn money, you have to be more specific in choosing the best keyword to attract organic traffic to earn money through your website. When we think of high paying keywords, the first thing that comes in our mind is CPC – Cost per Click. The maximum amount that an advertiser pays is termed as CPC. The more CPC of the keyword, the more will be the payout for the said keyword. Google has been the most accurate source of CPC.

All the website publishers and advertisers can use Google Adsense to advertise and earn money in return. Content can be advertised without much effort. You can display targeted Google ads on your website’s contents pages and earn valid clicks or impressions. One can utilize the Adsense; through which one can have access to Google’s advertiser’s network, and subsequently display your ads that are targeted to a particular audience which shows interest by knowing the most expensive keywords on the internet; you can create websites and web pages based on these keywords. On these web pages you can show expensive ads and sell your affiliates products or offers to earn money.

VDSL, Improvement of Internet Speed

VDSL/VHDSL (Very High Bitrate Digital Subscriber Line) is an improved version of the technology, ADSL or Asymmetric Digital Subscriber Line, which we use to connect to the internet. They are different in how they are implemented so you probably cannot use the equipment of one for the other. The most significant difference between the two technologies that is most relevant to the use is speed. ADSL can reach maximum speeds of 8mbps download and 1mbps for upload. In comparison, VDSL can have up to 52mbps for download and 16mbps for upload.

Because of the extremely high speeds that VDSL can accommodate, it is being looked at as a good prospective technology for accommodating high bandwidth applications like VoIP telephony and even HDTV transmission, which ADSL is not capable of. Another very useful feature of VDSL stems from the fact that it uses 7 different frequency bands for the transmission of data. The user then has the power to customize whether each frequency band would be used for download or upload. This kind of flexibility is very nice in case you need to host certain files that are to be downloaded by a lot of people.

The most major drawback for VDSL is the distance it needs to be from the telephone exchange. Within 300m, you may still get close to maximum speed but beyond that, the line quality and the speed deteriorates rather quickly. Because of this, ADSL is still preferable unless you live extremely close to the telephone exchange of the company that you are subscribed to. Most VDSL subscribers are companies who need a very fast server and would often place their own servers in very close proximity.

Due to the limitations of VDSL and its high price, its expansion is not as prolific as that of ADSL. VDSL is only widespread in countries like South Korea and Japan. While other countries also have VDSL offerings, it is only handled from a few companies; mostly one or two in most countries. In comparison, ADSL is very widely used and all countries that offer high speed internet offer ADSL.
DSL technology known as very high bit-rate DSL (VDSL) is seen by many as the next step in providing a complete home-communications/entertainment package. There are already some companies, such as U.S. West (part of Qwest now), that offer VDSL service in selected areas. VDSL provides an incredible amount of bandwidth, with speeds up to about 52 megabits per second (Mbps). Compare that with a maximum speed of 8 to 10 Mbps for ADSL or cable modem and it's clear that the move from current broadband technology to VDSL could be as significant as the migration from a 56K modem to broadband. As VDSL becomes more common, you can expect that integrated packages will be cheaper than the total amount for current separate services.

In this article, you'll learn about VDSL technology, why it's important and how it compares to other DSL technologies. But first, let's take a look at the basics of DSL.

A standard telephone installation in the United States consists of a pair of copper wires that the phone company installs in your home. A pair of copper wires has plenty of bandwidth for carrying data in addition to voice conversations. Voice signals use only a fraction of the available capacity on the wires. DSL exploits this remaining capacity to carry information on the wire without disturbing the line's ability to carry conversations.

Standard phone service limits the frequencies that the switches, telephones and other equipment can carry. Human voices, speaking in normal conversational tones, can be carried in a frequency range of 400 to 3,400 Hertz (cycles per second). In most cases, the wires themselves have the potential to handle frequencies of up to several-million Hertz. Modern equipment that sends digital (rather than analog) data can safely use much more of the telephone line's capacity, and DSL does just that.
VDSL could change the face of E-commerce by allowing all types of media to run smoothly and beautifully through your computer.
Wednesday, November 3, 2010

Slow WiFi connection Solution

computers as exhibiting the same slow connectivity, chances are good it has something to do with the WiFi. For example, perhaps the router got moved to a location that's blocking some of the signal.
It could also be that the router is failing, or that more library patrons are sharing a fixed amount of bandwidth (like more cars on a highway leading to slow-moving traffic). Without having more information, it can be tricky to troubleshoot a problem like this.
However, there's one step worth trying for anyone vexed by sluggish WiFi: try a direct connection to the router. (Actually, that should be your second step; the first is to reset both the modem and router.)

In other words, disable your PC's WiFi, then connect it directly to the router using an Ethernet cable. Windows should automatically detect the new connection and get you online accordingly, though you may have to reboot.

Problem solved? If so, you know there's some kind of WiFi issue to blame. If not, the culprit is probably a bad router, bad router settings, or the Internet connection itself (check with your service provider). Space doesn't permit me to address all these possibilities here, but at least you'll have narrowed down the problem.

Tips choose the right VPN need.

If someone need to connect your branch offices, remote workers and telecommuters to your corporate network. They need secure access, 24 hours a day. You know you're going to use some sort of VPN - the question is, which one? IPSec was the big thing until recently, but SSL VPNs have been gaining in popularity in the past while. And are there any other options?

Unfortunately, the answer to which is best is 'it depends', and it's likely that you'll need more than one type to handle all your requirements. So let's do a quick round-up of the pros and cons of your main choices.

SSL
We've written about the benefits of SSL VPN before, but in a nutshell, it creates a secure session from your PC browser to the application server you're accessing. Actually, in most cases, to a proxy server, rather than to the end application.

Using SSL VPNs to enable mobility | Linksys Wireless N Draft 2.0 Wi-Fi Gigabit Security Router with VPN WRVS4400N | Taking the Cisco route to a VPN

Remember that if you're SSL-encrypting traffic end to end, it can't be seen by your firewall, Intrusion Prevention Systems, load balancing devices or any other network management systems. SSL on your servers also adds a fair bit of overhead, so it's probably best to offload this to a proxy anyway, and then route the traffic through your secure corporate LAN.

The upside is that as far as your users are concerned, it's just web access. There's no client software to load, and it can be used anywhere. On the minus side, if you need access to applications that aren't webified, you'll need something to act as an intermediary - that may include your email.

Also, it's all web traffic, so you can forget about Quality of Service or voice, and things like FTP and telnet aren't natively supported, though you should be able to use an applet to forward traffic to the right TCP port number and get access that way. Multicast won't work, and it's not a site-to-site option.

IPSec
Tried and (almost) trusted, IPSec sets up a tunnel from the remote site - either a single user with client software on their PC or a network device terminating the tunnel for a whole office of users - into your central site. Once connected, you access your applications as normal, and it's immaterial whether they're web apps or not.

As the name suggests, it's designed for IP traffic, though that's not so much of an issue nowadays, but if you do have non-IP data, you'd need to configure up GRE tunnels separately and run IPSec over them, as you would to support multicast traffic.

Hybrids
A few companies have managed to combine features of SSL and IPSec, for example Net6 which is now owned by Citrix. Others are working to do the same.

MPLS
Let's not forget MPLS VPNs. They're no good for remote access for individual users, but for site-to-site connectivity, they're the most flexible and scalable option. All the work is at the network level - users just see standard network connectivity - and they support QoS and multicast, so you don't have to worry about which apps people need access to. Of course, an MPLS network isn't as easy to set up or add to as the others, and it's bound to be more expensive.

Remote Users
So for individual users, who may well be travelling, or need access from hotels and Internet cafes, forget MPLS. IPSec is good if you have control over your users' PCs and can manage VPN client downloads and updates. It's also probably the only option for IT support staff, or anyone who needs to be able to access a wide range of applications and services. It scales quite well, and VPN concentrators at the central sites make it reasonably manageable.

SSL comes into its own where you have people accessing your network from non-corporate PCs: partners, suppliers, public Internet-connected PCs, that sort of thing, since there's no client software needed. Where your users just need access to web applications, it's easy, quick and cheap. If you can get an Internet connection, you can get to your data. But it may not handle all the applications your enterprise needs.

Remote Offices
As soon as you have multiple users in one place, though, SSL may not be a good option. More efficient is to have one secure link from your remote site into the central office. If your traffic flows are such that all remote sites access your central site, in a hub-and-spoke arrangement, then IPSec is a good enough option. Your users don't have to bother with any client software, since it's all done in the network.

However, if every branch needs to communicate with every other, building a meshed arrangement is a real pain - especially if you need to set up GRE tunnels for non-IP or multicast traffic. Bear in mind that if you're deploying this and connecting over the Internet, you'll have no QoS guarantees, and your SLAs may not be suitable for business needs.

For large offices, or ones with complex requirements for connectivity or QoS, an MPLS VPN is likely to be your best bet. Even then, you'll need to make sure that your provider can support the levels of QoS you need, knows how to cater for multicast traffic, and can make changes in a sensible timeframe.

It's likely you're going to end up with a mix of VPN types to match your mix of network users. Don't try and force everyone to use the same access method, or you'll end up making life difficult for them and stressful for you. Define several categories of users, match each to the technology that suits it best, and you should find it becomes relatively straightforward to suit most needs.

WiFi WLAN Roaming Basics

Wireless LANs whole point is is the convenience of the mobility you get being able to wander from one part of the office to the other. Users expect the same completely transparent service they get as their mobile phones move from one cell to another, but in the world of 802.11 it’s not actually that easy. There’s a lot of publicity about roaming in Wi-Fi just now, for instance a new IEEE group on testing Wi-Fi has found that it is impossible to compare roaming times without a definition of roaming. While many wireless switch vendors make a point of roaming at Layer 3 (a technology we’ll cover the technicalities of in a later article), several other vendors (such as Bluesocket and Vernier, reviewed here under its HP badge) solve the problem by keeping all access points on a single subnet, so the roaming only happens at Layer 2 and the roaming device keeps the same IP address. What most people miss is that even roaming within a subnet, at Layer 2, has its challenges. What’s involved?

When a WLAN client moves from the range of one Access Point (AP) to another in the same subnet, it needs to find the best AP, decide when to roam onto it, associate with it and do any authentication required, as per your security policies. Then the wired network has to relearn the location of the client, so that data can be sent to it. All of this takes time and this is without the client having to worry about getting a new IP address! The scanning and decision making part of the roaming process (see How to Make your WLAN roam faster) allows the client to find a new AP on an appropriate channel as the user moves. When this happens, the client must associate with the new AP. It must then, assuming that it is an 802.1x supplicant (see The EAP Heap), reauthenticate with the RADIUS server. This is transparent to the user - but the delay in this happening may not be. It can take up to a second for association and authentication to occur (see below for implications and solutions). IAPP
The next part of the process is for the rest of the network to be made aware that the client has shifted. This calls for AP to AP communication, which was never catered for in the original 802.11 spec. Vendors had their own way of passing updates; however 802.11f, the Inter-Access Point Protocol, has now been now published by the IEEE as a trial-use standard - it sits in this state for two years before being submitted as a full-use standard - to facilitate multi-vendor AP interoperability. IAPP calls for the new servicing AP to send out two packets onto the wired LAN. One of these is actually set with the source address of the client (the standard says this should be a broadcast, however some implementations still use unicast to the previous AP or a multicast) and is used by intervening switches to update their MAC address tables with the client’s new location. The other is an IAPP ADD-notify packet from the new AP to an IAPP multicast address that all APs subscribe to, which contains the MAC address of the station it has just associated. All APs will receive this packet, and the one that had been associated with that station will use the sequence number included to determine that this is newer information and remove the stale association from its internal table. IAPP provides for the sharing of information between APs. The format of this information is specified, as "contexts" but the actual content is not defined, so it’s not yet hugely useful as far as vendor interoperability is concerned. Also IAPP has no specific provision for security. Who Cares?
So, worst case, you’re probably looking at about one second where your client can’t be reached over the network. For a lot of clients and applications, this isn’t an issue. If you’re walking from one room to another carrying your laptop, and you want to use email or a web browser, it’s not a problem. In fact, most TCP-based applications will be able to handle this sort of hiccup (remember that in this instance there’s no address change). UDP applications are less able to handle interruptions, and unfortunately, these are the ones where a break would be most noticed by the user. The killer? Voice. Not only is VoWLAN UDP-based for the bearer traffic, but it’s also the one application where you are likely to be using it as you move between APs. And you are definitely going to notice a one second hit. Which is presumably why the vendors that are pushing fast roaming for 802.11 are the ones squarely behind the use of wireless handsets in an IP Telephony environment, such as Cisco, SpectraLink and Symbol. Related standards
In fact these are three of the companies behind the drive for a new IEEE Working Group to create a standard to handle faster Layer 2 roaming. There are several related standards and works-in-progress, but none that actually cover this specific aspect:

* As already discussed, IAPP—802.11f—isn’t designed for speed.
* 802.11i, the security standard (not yet ratified) has provision for secure fast handoff, but it’s too security specific for this requirement.
* 802.11k—Radio Resource Management—might help in that it should cater for faster discovery of APs. Again, not yet finalised.
* 802.21 isn’t specifically for wireless LANs at all. It’s aimed at the handoff between heterogeneous networks (wired, 802.11, Bluetooth) and while it will deal with inter-ESS roaming (ie subnet to subnet in a WLAN), it won’t speed up the Layer 2 process which is needed prior to any Layer 3 interaction. This was the P802 Handoff Study Group, and is just in the process of kicking off now.

Fast roaming now
In the meantime of course, there are proprietary solutions. The two parts that need to be speeded up to cut down outage times are the scanning process (to allow clients to find new suitable APs to associate to), and, specifically for security, a faster way of reauthenicating to cut out the RADIUS request/response process. There are things that can be done to speed up the time it takes for a client to find another suitable AP. An AP can maintain information on its adjacent APs, which it can pass to a client on request—this will give the client a better indication of usable channels to scan, for example. The biggest time saver, however, is reckoned to be in localising the 802.1x authentication process. Cisco has incorporated Fast Secure Roaming into its Wireless Domain Services (WDS) portfolio as part of its Structured Wireless Aware Networking offering, which in effect allows an AP on each local subnet to act as the authenticator for clients. When a client (or other AP) goes through the initial RADIUS authentication, it does it via one AP running WDS. This lets that AP establish shared keys between itself and every other entity in the L2 domain, and allows for quicker reauthentication. Plans are for this capability to be included in Cisco’s router/switch platforms later this year as part of its SWAN development. Symbol provides similar functionality in its hardware, while Airespace) also caters for fast roaming in its wireless switches and appliances, and companies such as Bluesocket, which use gateways to control pretty dumb APs, manage everything centrally. Proxim handles things differently, pre-authenticating clients to nearby APs as well as the one currently in use in preparation for the client moving. So before you get excited about Layer 3 roaming, make sure you understand how your vendor of choice implements it at Layer 2. If that bit’s not fast enough to stop you losing traffic, you’ll never be able to move across subnets. It’s likely to be years before there’s a usable standard in place and in the meantime while you can probably get APs from different vendors to work together, there’s no guarantee of interoperability if you want to turn on their various fast roaming options.

About Me