Language Selection

English French German Italian Portuguese Spanish

Good Laptop Gains Little From Built-In Cell Receiver

Filed under
Sci/Tech

WiFi wireless networking has spoiled a lot of laptop users. The experience of getting instant broadband Internet access from the nearest wireless hot spot has programmed many people into thinking that they need only flip open a laptop to jump online -- and usually for free.

But in the overwhelming majority of the world, WiFi isn't there for the taking, even if you're willing to pay for it.

There's always dial-up access, but that means tying the laptop down to a fixed point and putting up with slow connect times and slow downloads.

Cellular data services, meanwhile, didn't acquire any sort of acceptable speed until a few years back and, with one exception, still trail far behind cable and DSL broadband. Their costs vary between excessive and extortionate. Finally, they demand that you pay extra for a special receiver card that will plug up your laptop's PC Card slot (if it has one) and require that you install its own peculiar software drivers.

Sony's new Vaio T350 laptop addresses one of those problems. It doesn't make wireless data access any faster or cheaper than before. But in addition to its WiFi capability, it includes a built-in cellular data receiver that works out of the box and leaves the PC Card slot open for other uses.

This seems like something that should have been done a long time ago. But there are some good reasons not to build in a cellular data receiver just yet, as the T350 winds up demonstrating.
As with any other type of cell phone, the T350's receiver can talk to only one type of wireless network, GSM (Global System for Mobile communication), and is set up to work with only one wireless carrier, Cingular.

Cingular's data service runs on a version of GSM called EDGE (enhanced data rates for GSM evolution), with advertised download speeds ranging from 70 to 135 kilobits per second (kbps).

Logging onto Cingular's EDGE service requires simply selecting that option from Sony's jargon-laden wireless-networking software, then waiting for the laptop to connect. A 30-day free trial is included in both available service plans: $50 for 50 megabytes of data use or $80 for unlimited use.

With a clear signal -- four or five bars of indicated strength, out of five total -- things proceeded pleasantly. When the test Vaio T350P, a pre-production unit lent by Sony, had just booted up, it took about 30 seconds to detect the wireless receiver and log on. Afterward (except for one time when the laptop couldn't find the receiver after waking up from standby mode), connections took less than 10 seconds.

As long as the signal remained strong enough, connection speeds averaged just below twice those of dial-up: around 90 kbps for downloads and 50 kbps for uploads.

That's awful compared with WiFi but far superior to the alternative of dial-up or nothing at all. Looking up information online required minimal patience, and I could download reasonably small files (for instance, updates to the antivirus software) without aggravation.

Unfortunately, when the wireless signal dropped to three or fewer bars of coverage, a different personality emerged in this laptop. Downloads slowed down precipitously, and sites loaded haltingly or not at all. I'd get the header graphic of a page, then have the connection time out on me. Browsing the Web under these conditions was a relentlessly miserable experience.

Sony designed this compact machine for extended use away from any sort of outlet, for power or data. The review model weighed under 3.1 pounds, with the power adapter adding almost 0.9 pounds. Battery life while on Cingular's network (but with WiFi switched off) ran to about 4 hours and 40 minutes in two tests.

Aside from the high cost -- $2,299 for the tested configuration -- the T350 is a good portable computer in general. Despite its compact dimensions (the wide-format screen measures just 10.6 inches diagonally) its keyboard was comfortable to use.

With a 50-gigabyte hard drive, combination CD-DVD drive that burns both types of discs, two USB and one four-pin FireWire (labeled "i.Link" by Sony) expansion ports, Bluetooth wireless and an open PC Card slot, it offers more utility and expandability than some far heftier laptops.

But I'd still rather add cellular data access to a laptop in the old-fashioned way, by popping in a PC Card receiver.

Cingular's EDGE service may cover more territory than any other carrier's data offering, as the company says in its marketing materials, but in many major cities it's far slower than the evolution data only wireless service (known as EvDO) sold by Verizon and, soon, Sprint.

Instead of merely doubling dial-up's speeds, EvDO offers downloads of 600 kbps or more, almost as fast as basic DSL service. Verizon's EvDO service, called BroadbandAccess, costs no more than Cingular's EDGE connection, even though it's about five times as fast. (It's a real accomplishment to make Verizon's data charges look like a bargain.)

But the EDGE receiver in the T350 can't ever tap into an EvDO connection.

Then again, a laptop with EvDO built in would simply put me in a different set of handcuffs; EvDO will itself eventually fall behind other wireless technologies.

What I want is a technology that companies such as Intel are working on -- "software-defined radio," in which a computer-driven receiver can adapt itself to different frequencies and systems as needed.

When that becomes a commercial reality, you'll be able to buy a laptop that can get on anybody's network.

Better yet, a software-defined radio will be something that, unlike current cell phones, wireless carriers can't own or control. It will let customers switch from one connection to another as they wish, taking their hardware as they go. That's going to drive these companies nuts. I can't wait.

By Rob Pegoraro
The Washington Post

More in Tux Machines

today's leftovers

  • CRI: The Second Boom of Container Runtimes
    Harry (Lei) Zhang, together with the CTO of HyperHQ, Xu Wang, will present “CRI: The Second Boom of Container Runtimes” at KubeCon + CloudNativeCon EU 2018, May 2-4 in Copenhagen, Denmark. The presentation will clarify about more about CRI, container runtimes, KataContainers and where they are going. Please join them if you are interested in learning more.
  • Meet Gloo, the ‘Function Gateway’ That Unifies Legacy APIs, Microservices, and Serverless
    Gloo, a single binary file written in Go, can be deployed as a Kubernetes pod, in a Docker container, and now also on Cloud Foundry. The setup also requires a copy of Envoy, though the installation process can be greatly simplified through additional software developed by the company, TheTool. The user then writes configuration objects to capture the workflow logic.
  • Why is the kernel community replacing iptables with BPF?

    The Linux kernel community recently announced bpfilter, which will replace the long-standing in-kernel implementation of iptables with high-performance network filtering powered by Linux BPF, all while guaranteeing a non-disruptive transition for Linux users.

  • The developer of Helium Rain gave an update on their sales, low overall sales but a high Linux percentage
    Helium Rain [Steam, Official Site], the gorgeous space sim from Deimos Games is really quite good so it's a shame they've seen such low overall sales. In total, they've had around 14,000€ (~$17,000) in sales which is not a lot for a game at all. The good news, is that out of the two thousand copies they say they've sold, a huge 14% of them have come from Linux. It's worth noting, that number has actually gone up since we last spoke to them, where they gave us a figure of 11% sales on Linux.
  • Want to try Wild Terra Online? We have another load of keys to give away (update: all gone)
    Wild Terra Online [Steam], the MMO from Juvty Worlds has a small but dedicated following, now is your chance to see if it's for you.
  • Arch Linux Finally Rolling Out Glibc 2.27
    Arch Linux is finally transitioning to glibc 2.27, which may make for a faster system. Glibc 2.27 was released at the start of February. This updated GNU C Library shipped with many performance optimizations particularly for Intel/x86_64 but also some ARM tuning and more. Glibc 2.27 also has memory protection keys support and other feature additions, but the performance potential has been most interesting to us.
  • Installed nvidia driver
  • Stephen Smoogen: Fedora Infrastructure Hackathon (day 1-5)
  • Design and Web team summary – 20 April 2018
    The team manages all web projects across Canonical. From www.ubuntu.com to the Juju GUI we help to bring beauty and consistency to all the web projects.
  • Costales: UbuCon Europe 2018 | 1 Week to go!!
    We'll have an awesome weekend of conferences (with 4 parallel talks), podcasts, stands, social events... Most of them are in English, but there will be in Spanish & Asturian too.
  • Tough, modular embedded PCs start at $875
    Advantech has launched two rugged, Linux-ready embedded DIN-rail computers with Intel Bay Trail SoCs and iDoor expansion: an “UNO-1372G-E” with 3x GbE ports and a smaller UNO-1372G-J with only 2x GbE, but with more serial and USB ports.

OSS Leftovers

  • IRS Website Crash Reminder of HealthCare.gov Debacle as OMB Pushes Open Source
    OMB is increasingly pushing agencies to adopt open source solutions, and in 2016 launched a pilot project requiring at least 20 percent of custom developed code to be released as open source – partly to strengthen and help maintain it by tapping a community of developers. OMB memo M-16-21 further asks agencies to make any code they develop available throughout the federal government in order to encourage its reuse. “Open source solutions give agencies access to a broad community of developers and the latest advancements in technology, which can help alleviate the issues of stagnated or out-dated systems while increasing flexibility as agency missions evolve over time,” says Henry Sowell, chief information security officer at Hortonworks Federal. “Enterprise open source also allows government agencies to reduce the risk of vendor lock-in and the vulnerabilities of un-supported software,” he adds.
  • Migrations: the sole scalable fix to tech debt.

    Migrations are both essential and frustratingly frequent as your codebase ages and your business grows: most tools and processes only support about one order of magnitude of growth before becoming ineffective, so rapid growth makes them a way of life. This isn't because they're bad processes or poor tools, quite the opposite: the fact that something stops working at significantly increased scale is a sign that it was designed appropriately to the previous constraints rather than being over designed.

  • Gui development is broken

    Why is this so hard? I just want low-level access to write a simple graphical interface in a somewhat obscure language.

OpenBSD and NetBSD

Security: Twitter and Facebook

  • Twitter banned Kaspersky Lab from advertising in Jan
     

    Twitter has banned advertising from Russian security vendor Kaspersky Lab since January, the head of the firm, Eugene Kaspersky, has disclosed.  

  • When you go to a security conference, and its mobile app leaks your data
     

    A mobile application built by a third party for the RSA security conference in San Francisco this week was found to have a few security issues of its own—including hard-coded security keys and passwords that allowed a researcher to extract the conference's attendee list. The conference organizers acknowledged the vulnerability on Twitter, but they say that only the first and last names of 114 attendees were exposed.

  • The Security Risks of Logging in With Facebook
     

    In a yet-to-be peer-reviewed study published on Freedom To Tinker, a site hosted by Princeton's Center for Information Technology Policy, three researchers document how third-party tracking scripts have the capability to scoop up information from Facebook's login API without users knowing. The tracking scripts documented by Steven Englehardt, Gunes Acar, and Arvind Narayanan represent a small slice of the invisible tracking ecosystem that follows users around the web largely without their knowledge.

  • Facebook Login data hijacked by hidden JavaScript trackers
     

    If you login to websites through Facebook, we've got some bad news: hidden trackers can suck up more of your data than you'd intended to give away, potentially opening it up to abuse.