This week, I will be talking about Internet Appliances. This is hot in the Linux space. Plus, this is the market that Be, Inc. decided to use as the new focus of their company.
While a toaster running Linux could be an Internet Appliance, this isn't the right track to be on. An Internet Appliance is a system in which the primary function is to put someone on the Internet. In ham radio, we have the term appliance operator which refers to a ham who doesn't really know anything about the technology, but just uses a radio to talk to people. An Internet Appliance is the equivalent tool that allows someone with no knowledge of Internet technology or computers to get on the Internet.
How does this differ from a computer system purchased primarily to connect someone to the Internet? This difference will grow as Internet Appliances (IA) evolve, but even today, they are different. An IA is not a general-purpose computer. It is designed specifically for connecting to the Internet. The software is likely in ROM (read-only memory) rather than on a disk. That software is probably only a pared-down version of an operating system and a web browser. It will, out of the box, talk to the Internet.
All this doesn't necessarily mean it won't be part of a toaster, or more likely, a stove or refrigerator. In addition, there will be stand-alone IAs and a very portable version commonly referred to as a web pad. The web pad is expected to offer wireless web service. The first example of this type of product is the Palm 7 from 3COM. Plan on seeing more in the near future.
As IAs evolve, we can expect to see free applications from vendors. "Free", however, will have strings attached. For example, a book retailer might offer an application that offers easy access to reviews, but also offers a quick path to purchasing books from them. The same goes for a free cookbook from a grocery chain.
This raises the issue of compatibility between IAs. They don't need to be manufactured by the same company and they don't need to run the same processor chip, but they do need a common language if they are to succeed. After all, if Safeway were to put together a free cooking program, they would prefer having one that runs on everyone's IA rather than writing a bunch of different versions.
Much like the commercialization of the Internet, IAs are bringing it a new group of consumers. They know little about the technology behind the Net, and are here only as consumers. This is similar to what happened with commercial radio, and later, television. What we saw happen was the creation of a consumer culture, consisting largely of people who were willing to pay the price of having to sit through advertising in order to get the information they wanted.
With this new class of Internet Consumer who has little or no interest in the technology, we will see more buying-habit-related advertising. In the next few years, there will be some big changes in advertising trends on the Internet. Much like public TV or National Public Radio, Internet sites are going to have to weigh carefully their "free information" vs. "paid by ads" positions.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Firefox 46.0 Released
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- The Death of RoboVM
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide