Internet Uses 9.4% of U.S. Electricity, According to Uclue Research

Equipment powering the internet accounts for 9.4% of electricity demand in the U.S., and 5.3% of global demand, according to new research from Uclue.com.

(PRWEB) September 25, 2007 — Equipment powering the internet accounts for 9.4% of electricity demand in the U.S., and 5.3% of global demand, according to new research from Uclue.com.

The annual energy demand of computers, monitors, networking, and transmission equipment for the internet amount to 350 billion kWh in the US — 9.4% of the 3.7 trillion kWh used in total. Similarly, world demand for the internet is 868 billion kWh, or 5.3% of total global electricity consumption of 16.33 trillion kWh.

The largest demand for internet-related energy use comes from desktop computers and monitors, which account for two-thirds of total use. Networking equipment such as modems and routers are another sizable draw, as are the substantial power demands for data processing and equipment cooling at data centers. Actual data transmission, on the other hand, chiefly over telephone lines, is a small component — approximately 0.1% — of overall energy demand.

"As far as we know, this is the first estimate of total internet electricity use," said David Sarokin, the Uclue researcher who compiled the data. "The raw numbers were all out there, but they hadn't been assembled in this way before."

The full presentation and analysis of the data, Energy Use of the Internet, can be seen at Uclue's website at: http://uclue.com/index.php?xq=724.

About Uclue.com:
Uclue is a professional, online research service handling a wide variety of business, academic, health, engineering, legal and personal research needs.

 

{mos_fb_discuss:19} 

Linux as an alternative to Windows

    If you are anything more than a very casual computer user,  you've probably heard someone talking about Linux recently. Perhaps you're wondering exactly what Linux is and what all the fuss is about?  Well, read on and we'll attempt to answer some of the questions you may have and hopefully dispel a few myths and misconceptions along the way.

    Linux is an operating system much like Windows XP or Vista, Mac OSX, etc. An operating system is basically just a bunch of instructions that manage the software and hardware on your computer. Software refers to all of the applications that you use, such as word processing programs, web browsers, email clients, etc. Hardware is the physical parts of your computer such as the processor, memory, CD drives and the like.

    Why would I want to try Linux? I would have to say that the main reason for using Linux is that it's free. Yes, FREE! Linux is an “open source” operating system. The definition of open source is software that has been developed by a community of folks and provided to the general public, free of cost.  A second reason is that it runs very well on an older computer that may not be capable of running the newest version of Windows. Thirdly, there are literally tens of thousands of open source applications (software) that are available for download. Lastly, there is security.  Linux was developed from the start with security in mind. The Linux operating system is not as susceptible as Windows is to a majority of the threats that are common on the internet today.

    OK, so what's the catch? Well, there is a new user interface to learn. The Linux desktop doesn't “look” like a Windows desktop. Of course, a Vista desktop doesn't look like an XP desktop and a Mac desktop doesn't look like a Windows desktop, so there is a bit of a learning curve going from one operating system to another, regardless of which one you choose.  Linux also has a reputation of being a “techie's” operating system, requiring a bit more knowledge to set up and use than the typical user may possess but this has been largely eliminated as of late. Another issue is that Linux may not work with the latest cutting edge hardware, although as the use of Linux becomes more widespread this is less of a problem that it has been in the past.

    Who is Linux good for? This operating system works very well for those of us that simply need the basics: browsing the web, checking email, writing documents, working with spreadsheets, etc. Linux is a great choice for those Windows 98/2000/XP users whose old computers are running really slow and are considering upgrading but have to buy a new PC just to run Vista. It's also good for those power users that like to dig around and play “under the hood” so to speak. Linux will not work for those users that need to run Windows only software such as QuickBooks, or “gamers” who play games written exclusively for Windows.

    Alright, so you've decided that you want to try Linux, now what? My suggestion is to download a copy from the internet and see how you like it. Linux comes in many varieties called “distributions” (or “distros”). There are several distros that I can recommend for a new user; these are listed at the end of this article. All of these are available in what is referred to as a “live” format, meaning that they can be run from a CD without actually having to install them on the hard drive of your computer. You simply download and burn the CD, put it in your CD player, and reboot your computer. (Keep in mind that they will run a bit slower than they would if they were actually installed). This allows you to get a feel for Linux and how it works, as well as testing whether a particular distribution can detect and correctly configure all of your hardware. If you decide that you like one of these, there is usually an “install to hard drive” option right on the desktop. You can even install Linux in parallel to Windows and choose which operating system to load when your computer boots up!

    What if I have problems, where can I get help? There is a fantastic community of Linux users on the internet that are more than happy to help new users. Google is your friend. Most communities have a local Linux User's Group (LUG) that holds open meetings on a regular basis; new members are always welcome. These LUG's usually have occasional “Install Fests” where you can bring you computer and they will help you install Linux and answer any questions you may have. Check you local computer magazines for information on these type activities and groups.  Again, Google is your friend.

    I hope this article has answered some of your questions about Linux and maybe even made you consider giving it a try. Below is a list of resources you will find helpful if you decide to pursue this further.

Todd Hughes is a Network Security Analyst and long time Linux fan in the Upstate New York area. Send your Questions, comments or feedback to: thughes@fwpm.com.

Copyright  Todd Hughes  2007. Printed by permission.
   

Resources:

Recommended Distributions:

http://www.pclinuxos.com/index.php?option=com_ionfiles&Itemid=28
http://www.xpresslinux.com/download.php
http://www.kubuntu.org/download.php
http://www.knopper.net/knoppix/index-en.html
http://www.mepis.org/mirrors
http://www.mandriva.com/en/download/free

Other Distributions:

http://distrowatch.com/

How to “burn” a disk properly:

-using Windows XP
http://www.petri.co.il/how_to_write_iso_files_to_cd.htm

-using Nero
http://www.wizardskeep.org/mainhall/tutor/neroiso.html

-using Roxio
http://onlinepubs.trb.org/onlinepubs/burning_iso.html

 

{mos_fb_discuss:35} 

Do You Think Like a Millionaire? Give Yourself a 25 Year Head Start

You wanted to see this article again. Here it is. 1) What you habitually say to yourself all day creates your Habits of Thought 2) Your habits of thought create your Desires 3) Your desires create what you Do 4) What you do creates your Life

(PRWEB) September 24, 2007 — Acquire the habits of thought of people who are healthy, wealthy and happy – and you eventually become more healthy, wealthy and happy.

Why? Because you eventually do what they do and your similar actions produce similar rewards. In other words:

1) What you habitually say to yourself all day creates your Habits of Thought
2) Your habits of thought create your Desires
3) Your desires create what you Do
4) What you do creates your Life – wealth or poverty, health or illness, joy or despair. Your actions make your world a better place or make your world a worse place.

All day long you say things to yourself. You have done so your entire life: "I'm stupid; I'll always be poor; I'll never lose weight; no one likes me; I'm worthless."

If you want more out of life – change those statements. How do you do that?

What you repeat to yourself you eventually believe – whether it's helpful or harmful, accurate or inaccurate, honest or dishonest.

Individuals or organizations that want to implant harmful beliefs into their victims use this process all the time. By the way, to rid yourself of harmful beliefs, just question those beliefs and they begin to weaken.

Through the centuries, this process has been called many things: autosuggestion, goal statements, self-talk, affirmations, self-suggestion, conditioning. Now it's time you use it on purpose instead of accidentally. Here's how.

Example:
You want financial independence. How do you find out what millionaires say to themselves about making money? You could spend decades finding out for yourself – or take the following shortcut and save yourself 25 years of time and money.

The habits of thought of 500 millionaires are in Napoleon Hill's timeless book "Think and Grow Rich" in the chapters on "Faith" and "Autosuggestion."

So, to think like a millionaire and to earn the income you want, do the following two steps:

1) As often as possible each day for the rest of your life read silently or aloud the "Self-Confidence Formula" Napoleon Hill's suggests in the chapter on "Faith" and

2) As often as possible each day for the rest of your life read silently or aloud the "How to Stimulate Your Subconscious Mind" section in the chapter on "Autosuggestion."

As you read the above, see, hear, and feel yourself doing what you read. Soon, you begin to get ideas on what you need to do to make those thoughts become real. The same principle works for other areas of life: physical – spiritual, social – emotional, financial – intellectual as well as achievement in business, art, science, and sports.

One last point. You are 100 percent responsible for your thoughts, desires, actions, and results. If you don't like the results you are getting in life, begin with your thoughts.

And don't use the "victim" mentality of "Oh, I tried this and it didn't work" or "This is stupid. I'm not doing this." Replace unwanted thoughts by saying to yourself 'Next!' and take charge of your life by managing your mind FIRST – your actions and your rewards follow.

Copyright 2004-2007 Lonni Erickson. All Rights Reserved. You now have permission to reprint this article as long as it is not edited and the below resource information is included.

Lonni Erickson is a writer in Washington state. Other articles by the author include "Was Jesus an Allegory or a Real Person?" at www.prweb.com.

Free yourself from individuals who use force, threats, fraud, guilt, or fear to steal your time, money, and energy. See www.neo-tech.com

{mos_fb_discuss:no_discuss} 

Open Source Innovation Named One Of ’50 Maverick Minds’

Open Source Innovation, a blog devoted to the practices of innovation, creating thinking and collaboration, has been named one of "50 Maverick Minds" by Mavericks at Work. Authors Bill Taylor and Polly LaBarre have placed Open Source Innovation in a list of 50 innovators that includes such visionaries as Tom Peters, Mark Cuban and Fast Company Magazine.

Baltimore, MD (PRWEB) September 24, 2007 — Open Source Innovation, a blog devoted to the practices of innovation, creating thinking, and collaboration, has been named one of "50 Maverick Minds" by Mavericks at Work. Authors Bill Taylor and Polly LaBarre have placed Open Source Innovation in a list of 50 innovators that includes such visionaries as Tom Peters, Mark Cuban and Fast Company Magazine.

Sandy Cormack, change facilitator and owner of the Open Source Innovation website, created the blog to help people learn to think like innovators. His blog places a wealth of information on innovation effectiveness, creative thinking techniques and innovation books/videos at the world's fingertips.

"The main thing I have in common with the other 'Maverick Minds' is the desire to effect change," says Mr. Cormack. "The best way to do this is to make the tools, philosophies and sciences of innovation available for everyone."

Aside from running the Open Source Innovation blog, Mr. Cormack also teaches innovation and creative thinking techniques, and facilitates creative problem solving sessions.

http://opensourceinnovation.wordpress.com

{mos_fb_discuss:no_discuss} 

Computerworld Honors Program Recognizes AmigoLatino As Laureate Finalist

AmigoLatino (www.amigolatino.com), a company that connects immigrants in the United States with their families in Latin America live and in real-time using video conferencing technology for face-to-face virtual family reunions, has been recognized as a Laureate Finalist by IDG's Computerworld Honors Program.

Los Angeles, CA (PRWEB) September 24, 2007 — AmigoLatino (www.amigolatino.com), a company that connects immigrants in the United States with their families in Latin America live and in real-time using video conferencing technology for face-to-face virtual family reunions, has been recognized as a Laureate Finalist by IDG's Computerworld Honors Program. For almost two decades, Computerworld Honors has acknowledged those individuals and organizations that have used information technology to benefit society. This year's honorees were commemorated during the 19th Annual Laureates Medal Ceremony & Gala Awards Evening on June 4, 2007 at the Andrew W. Mellon Auditorium in Washington, D.C.

"We are honored to have been nominated by Polycom for the award and selected as a 2007 Laureate Finalist by the Computerworld Honors Program." said Gabriel Biguria, Founder and CEO of AmigoLatino. AmigoLatino, through the Amigo Live communications channel, is a pioneer in addressing the needs of the migrant community in the United States. What makes Amigo Live exceptional is the premise behind it. Biguria's goal is the democratization of access to advanced technology, specifically bringing video conferencing and the benefits it holds for people separated by such great distances, to the masses.

From the beginning, Biguria's focus has been providing the highest quality of service, both in terms of technology and the customer experience. All of the AmigoLatino offices are set up to resemble living rooms and provide a relaxed, comfortable environment. Scheduling a video call is simple, once the participants in the United States have decided on a date and time, AmigoLatino makes all of the arrangements with the family in Latin America.

"All the families need to think about is enjoying their relatives," says Biguria. "Although I've been told that participants don't sleep for days in advance of a conference due to the anticipation."

At the cost of only $40 per half hour conference, AmigoLatino's Amigo Live service has connected more than 10,000 families. The video reunions have included everything from birthday celebrations – complete with cake and flowers arranged by AmigoLatino beforehand – to brides who go to an AmigoLatino office in Latin America on their wedding days so their fathers in the US can see them in their wedding dresses and give their blessings.

"Each Laureate selected for this honor understands the importance of using one's resources and technical prowess to benefit one's fellow man.", said Bob Carrigan, Chairman of the Computerworld Honors Program Chairmen's Committee and President, IDG Communications.

About AmigoLatino
AmigoLatino was launched by a passionate team of entrepreneurs with the goal of helping to democratize access to innovative channels that enhance cross-border communications and e-commerce initiatives in under-served markets. Our main channel, "AMIGO LIVE", leverages business quality video conferencing to help reunite distant families, community groups and organizations, in real-time and at a low cost, between the US and Latin America. Another channel, "AMIGO COMPRAS", provides families with new and efficient alternatives to the traditional cash remittance transfers, while allowing for control towards the final utilization of the funds. Very soon we will be expanding the depth and breadth of our services to the rest of the world! For more information visit www.amigolatino.com or call: (213) 380-4761

About Computerworld
Computerworld is the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning weekly publication, Computerworld.com Web site (www.computerworld.com), focused conference series and custom research form the hub of the world's largest (40 edition) global IT media network. In the past five years alone, Computerworld has won more than 100 awards, including Folio Magazine's 2006 Gold EDDIE Award for the best technology/computing magazine, the 2004 and 2006 Magazine of the Year Award, and 2006 Best Overall Web Publication from the American Society of Business Publication Editors (ASBPE). Computerworld leads the industry with a print audience of 1,252,000 readers each week (IntelliQuest CIMS Spring 2006) and an online audience of over 2 million unique monthly visitors (Omniture).

Computerworld is a business unit of International Data Group (IDG), the world's leading technology media, research and events company. A privately held company, IDG publishes more than 300 magazines and newspapers, including CIO, CSO, Computerworld, GamePro, InfoWorld, Network World and PC World. The company features the largest network of technology-specific Web sites, with more than 400 around the world. IDG is also a leading producer of more than 170 computer-related events worldwide, including Storage Networking World®, Premier 100®, LinuxWorld Conference & Expo®, Macworld Conference & Expo, DEMO® and IDC Directions. IDC provides global market research and advice through offices in 50 countries. Company information is available at http://www.idg.com

Cyber Security: Physical Security Do’s and Don’ts

Dr. Robert Schmid, Cyber Security Analyst for the New Media Institute provides guidelines designed to keep individuals conscious of computer security and help secure computer data.

New York, NY (PRWEB) September 24, 2007 — New Media Institute and CyberSecure Technologies have developed a list of security fundamentals to help you protect your computer, your workplace network, and your personal data.

"These guidelines are designed to keep you conscious of computer security in the broadest possible sense. They are by no means the only practices and procedures you should follow, but they are certainly among the most important," advised Dr. Robert Schmid, cyber security analyst for the New York-based New Media Institute.

  All computers, from your desktop in the den to the laptop you use on the road, have become more and more vulnerable to intrusion and attack. From January 2005 to the present an estimated 165 million data records of US residents have been exposed according to the Privacy Rights Clearinghouse. Viruses, worms, malware and spyware are rampant throughout the Internet. Entities as diverse as the federal government and the City of New York pension system to companies like SAIC, AT&T and numerous banks have had laptops with supposedly secure information either lost or stolen.

Physical Security Fundamentals

There is danger posed by the loss of physical control of your computer. The most extensive breaches of computer data in the past six months have been the lost laptops and unsecured workstations at companies like SAIC and a host of government agencies. Physical security is paramount.

To deal with these physical aspects of computer and data security, NMI recommends the following:

 

  • Protect your computer from physical damage. Simple as it may sound, the first line of defense against losing your data is to make sure your computer is safe from actual physical damage. There are horror stories about irreplaceable data being lost because a laptop fell into a pool or out the back of a poorly packed SUV.

  • Protect your computer from electrical damage. Electrical shutoffs, power failures, and electrical surges are all part of modern life. Your computer requires a steady "clean" source of power in order to operate properly. Turn it off in a storm. Use a power surge protector. Do not run motors or other heavy duty equipment (copiers, fans, air conditioners, etc.) on the same circuit as your computer! If possible, install an uninterruptible power supply (UPS) that will maintain enough power for your computer to complete a normal shutdown even if the power fails.

  • Protect your computer when you are not using it. If you only step away from your computer for a few minutes, there is enough time for a casual passerby to use your equipment. Securing your work area, at home or the office prevents even friendly users, the kids or your co-workers, from accidentally corrupting your system or deleting your information. After all, it is simple to sit down at an unoccupied computer access either the Internet or email. Your personal information is at risk when your computer equipment is unsecured! If possible, turn your workstation or laptop off when it is not being used.

  • Disconnect your computer from the Internet when you are not using it. We have all left our computers connected to the Internet and walked away from them. Permanent connections, either through a business network or DSL are commonplace. The risk, however, is becoming more and more serious. IM sessions, automatic program updates, email, and scripting all have risks based on their continued connection to the Internet and the unattended nature of their activities. If another person using IM (Instant Messenger) has an infection, you run the risk of unwanted intrusions yourself just by being on their chat list!

  • Carefully consider your security settings. Programs and data are only as secure as your passwords and security settings. Operating systems, browsers, and most commercially available software have put in place a series of options that give the user the ability to require identification and passwords for everything from logging on to opening a specific file. Use what your system offers! It can be tailored to meet your needs and requirements. If the choice is ease of use or security, opt for security. Enabling program options that increase convenience may leave you more vulnerable. Examine all system settings, particularly the security settings, and select options that decrease your risk of data loss or intrusion.

  • Back up your data. Files and data are lost by users all the time. We have all accidentally erased a file. No matter how much you protect your data and the machine that houses it, it can be lost. The hard drives we all depend on to store our data have a fixed life expectancy. A low but significant percentage of them fail within months of production but all of them eventually crash. In addition, files can be damaged or destroyed by a virus or worm, a natural event, or a problem with your equipment. A simple disruption of transmission from the hard drive through the CPU can render a file useless. Regularly backing up your data is a no-brainer. Using a CD, DVD, network drive, tapes, or an external memory device will mitigate any problems created when your data is corrupted or destroyed.

  • Protect your backups. When you make your data backups, make sure they are kept in a safe, secure location. It does no good to secure your PC and leave the backups where anyone might find them!

  • Guard your peripherals. With the spread of flash drives, portable computer memory, memory cards and mini hard drives many users store valuable data in multiple places. Many of the devices are so small they are easily misplaced or lost. Users also use these devices to transfer files between machines without realizing a copy of the file could be left on the device itself. Encrypt important data files on these devices. Keep close track of miniature memory devices. Wipe them clean when a transfer has been completed. Do not leave them in computer chip slots or USB pots. Be careful. Your data is easily accessed if the device falls into the wrong hands.

About New Media Institute

The New Media Institute (NMI) is a research and fact finding organization whose mission is to improve public understanding of issues surrounding the Internet and other forms new media communications. Register now for the Search Engine Optimization (SEO) Workshop

 

{mos_fb_discuss:no_discuss} 

Visionary Installs Metro Ethernet in Town of 4,000

Visionary Communications has installed Metro Ethernet in rural Buffalo Wyoming, providing Ethernet Internet connectivity to businesses in the town of 4,000 people.

Casper, WY (PRWEB) September 24, 2007 — Visionary Communications (www.vcn.com) has installed Metro Ethernet in Buffalo Wyoming, providing Ethernet Internet connectivity over copper telephone lines. With a population of 4,000 people, Buffalo benefits from Visionary's aggressive expansion of business data services. The company's Metro Ethernet platform will provide service to their large business customers in the rural Wyoming town.

Visionary uses bonded synchronous Digital Subscriber Lines (DSLs) to deliver the Metro Ethernet connection to their customers over copper phone lines. The company embraces this technology because of the availability of copper connectivity to businesses, and the fact that fiber requires lengthy install periods. Metro Ethernet is capable of delivering up to 40Mbps of synchronous data to Visionary's business customers at a fraction of the cost for DS3 services.

"Folks overlook small towns like Buffalo when installing these types of services," said Preston Schilling, who oversees Visionary's Metro Ethernet plant. "We have large business customers there – we're happy to be the first and only to provide them with this class of service."

The company's first install feeds it's wireless plant in Buffalo, expanding the wireless backbone from 2Mbps to 20Mbps. The first customer on the service is scheduled to be installed next week, and will replace a legacy T1 with the new Metro Ethernet service. T1s for large customers have become noticeably slower in the last couple of years with the sheer volume of data flowing to and from businesses.

Visionary's Buffalo Metro Ethernet Plant services an area of three miles from the center of town, covering almost all of the businesses in the area that would be interested in the service.

Visionary Communications is Wyoming's pioneering broadband provider, offering DSL in 18 Wyoming communities, and wireless broadband in 11 Wyoming communities. The company provides Internet services in more than 90 towns and cities, and operates its own DSL and fixed-wireless plants throughout Wyoming and Montana. The company is headquartered in Gillette, Wyoming.

 

{mos_fb_discuss:32} 

Computer Hackers Target Entertainers’ Home Computers: LIGATT Security Watch by Gregory Evans

LOS ANGELES (BusinessWire EON) September 24, 2007 — Computer hackers are the new paparazzi. Hackers are now targeting entertainers. In a hackers chat room, LIGATT Security has learned that hackers are targeting entertainers and their managers home computers. Seeing how much money can be made from one paparazzi photograph, hackers now have a vested interest in all private photos, family pictures, nude photographs, and personal and sexual video footage; they know that one picture can be sold for hundreds of thousands of dollars to tabloid newspapers all over the world.

Hackers find it easy to break into entertainers' computers. Common home users, not just entertainers, get high speed DSL or cable internet service installed in their homes; they plug them directly into their computers instead of a firewall that will help protect them. A hacker will then use port scanning programs to scan IP addresses in certain areas such as Beverly Hills and Malibu, CA. Once they scan the IP addresses, they can look for open ports on the entertainer's computer (every computer has open ports); then they will use some type of exploit (http://cve.mitre.org/) to hack into the entertainer's computer through that open port. Local hackers will drive around certain neighborhoods, like the Hollywood Hills, and pick up all the wireless networks. Research shows that over 70% of people who purchase a wireless router do not turn on the security WPA or WEP encryption. And even if they do have the encryption turned on, a good hacker will use a program such as Aircrack to break their wireless encryption code within fifteen minutes.

Once the encryption code has been cracked, the hacker will start searching the hard drive for pictures and files. Some hackers will install Spyware on the entertainers computer so that everything the entertainer does on his computer will be emailed to the hacker. What this means is that all of their emails that they send/receive, pictures, screen shots and bank account information will get emailed to the hacker. This also includes song lyrics, new movie scripts, contracts, and even the beats to a new song.

For the full story go to www.ligattsecurity.net/securitywatch.

 

{mos_fb_discuss:32} 

Ultra Compact Wireless Bridge for HD Video Streaming Released

HauteSpot Networks Corporation, announced the immediate availability of the new HauteRoute HR-IXPSXPi ultra compact wireless bridge which is optimized for high definition live video streaming over IP (HDTV, IPTV, and surveillance). The HR-IXPSXPi builds upon the existing HR-IXPSXP, by moving to an ultra compact, lightweight enclosure and by adding Serial Over IP support. It is perfect for high definition surveillance and broadcast production applications.

San Luis Obispo, CA (PRWEB) September 22, 2007 — HauteSpot Networks Corporation, announced the immediate availability of the new HauteRoute HR-IXPSXPi ultra compact wireless bridge which is optimized for high definition live video streaming over IP. The HR-IXPSXPi builds upon the existing HR-IXPSXP, by moving to an ultra compact, lightweight enclosure and by adding Serial Over IP support.

The HR-IXPSXPi is designed for use in indoor and portable applications where excellent wireless link performance is required, such as video surveillance, HDTV production, event production and electronic signage.

  By attaching any IP camera or video encoder to the HR-IXPSXPi, live high resolution video can be transmitted wirelessly at data rates of up to 68Mbps over distances up to 2km. The bridge operates on a range of frequencies in both licensed and unlicensed spectrum, and can be powered from any 12VDC camera, car or boat battery, or from AC wall power. It can be easily mounted to the back of a camera using off-the-shelf mounting brackets. It can even be fitted to mount on a belt as a wearable device.

Unlike competing COFDM solutions costing many times more, the HR-IXPSXPi is fully TCP/IP compliant and bi directional. This allows in-band control of devices attached to the HR-IXPSXPi. For video encoding this means that adaptive rate algorithms can be used to offset changes in the RF signal quality. HauteSpot Networks has tested the HR-IXPSXPi with a number of broadcast quality video encoder/decoders and has had tremendous success supporting up to 1080p@60fps with end to end latency of less than 80ms. This is ideal for real time HDTV production and surveillance applications.

"Proprietary COFDM microwave solutions have to make assumptions about RF environmental conditions, because they are one-way, and be pre-set accordingly. If a camera wanders beyond the pre set assumptions, the RF signal falls off a cliff," said Tim Harvey, the CTO of HauteSpot Networks, "Our bi-directional HauteLine protocol and radios can dynamically adjust to changing conditions by speeding up or slowing down." Harvey continued, "And video encoders can do the same over IP, allowing a persistent wireless link in the worst conditions."

There is no comparison between the HR-IXPSXPi using the HauteLine Protocol and 802.11 WiFi. 802.11, as a contention based protocol just is not appropriate to high bandwidth video. There are too many interruptions which cause jitter and delay variation with 802.11 and bit rates fall off at very short distances.

"We find that customers look at our products after having a number of failures with competing technologies, " said Charlotte Chang, VP of Marketing at HauteSpot Networks. "For example, customers will try running video over 802.11 networks and find that they cannot get the resolutions they need. Our HauteLine Protocol delivers the performance they need for high definition surveillance and broadcast video production."

The HR-IXPSXPi uses the HauteSpot Networks HauteLine protocol to achieve the streaming of standard definition and high definition video, with low latency and constant low delay variation at rates up to 65Mbps. It is a completely modular platform which allows for various radio modules supporting a variety of unlicensed, government only, or export radio frequencies, and comes in both outdoor and indoor/portable enclosures. It is full TCP/IP compliant and supports IP Multicast over UDP. IP Multicast allows the HR-IXPSXPi to broadcast in a point to multipoint mode so that a single transmitter can send to multiple receivers. Ideal for digital signage and event production.

By enabling the Serial Over IP feature, the HR-IXPSXPi can be configured to operate as a data terminal or data device in a serial link, at speeds up to 115,200kbps. Serial Over IP allows for remote control of camera pan-tilt-zoom, industrial application control, or any other application where serial communications is required. The female RS-232 DB-9 connector can be easily converted to RS-422 using low cost adapters. This allows remote operation of cameras and other devices by surveillance or broadcast personnel.

The Serial Over IP capability of the HR-IXPSXPi is implemented over IP multicast, allowing not only point to point, but point to multipoint serial communications. Users can monitor serial activity from a third HR-IXPSXPi unit for troubleshooting, or the same command can be sent to multiple HR-IXPSXPi at one time.

Radio module options for licensed and unlicensed frequencies are available. Call for details.

Pricing for the HR-IXPSXPi starts at just $899 per end.

About Hautespot Networks
The experienced team at HauteSpot Networks Corporation designs, sells, and supports wireless broadband solutions meeting the unique requirements of the broadcast, surveillance, public safety, public utilities, and military markets. This means delivering product performance and features that are leading edge in a format that is simple for our customers to use.

HauteSpot Networks' high performance modular wireless routing platform can be easily configured to meet the most demanding needs of HD broadcast, surveillance, and OEM customers. HauteSpot Networks' proprietary HauteLineTM protocol supports wireless video streaming at rates up to 65Mbps with low latency, no jitter, and predictable delay variation.

Founded in 2002 in San Luis Obispo California, HauteSpot Networks Corporation is privately held.