Consumer Reports can't recommend iPhone 4, demonstrates duct tape solution, "don't touch me here"

When I look at the above video, I think an answer could be a "don't touch me here"

Above is a video from Consumer Reports published today that they cannot recommend the iPhone 4.

Lab tests: Why Consumer Reports can't recommend the iPhone 4

Lab test: Apple iPhone 4 design defect confirmed

It's official. Consumer Reports' engineers have just completed testing the iPhone 4, and have confirmed that there is a problem with its reception. When your finger or hand touches a spot on the phone's lower left side—an easy thing, especially for lefties—the signal can significantly degrade enough to cause you to lose your connection altogether if you're in an area with a weak signal. Due to this problem, we can't recommend the iPhone 4.

We reached this conclusion after testing all three of our iPhone 4s (purchased at three separate retailers in the New York area) in the controlled environment of CU's radio frequency (RF) isolation chamber. In this room, which is impervious to outside radio signals, our test engineers connected the phones to our base-station emulator, a device that simulates carrier cell towers (see video: IPhone 4 Design Defect Confirmed). We also tested several other AT&T phones the same way, including the iPhone 3G S and the Palm Pre. None of those phones had the signal-loss problems of the iPhone 4.

Consumer Reports does suggest a fix.

If you want an iPhone that works well without a masking-tape fix, we continue to recommend an older model, the 3G S.

ZDnet makes an interesting point now that Consumer Reports has joined the iPhone 4 antenna debate.

It’s one thing for a blogger like me to go on these rants about the shortcomings of the iPhone 4. But when Consumer Reports, which has the power to drive or halt buying decisions with its recommendations, announces that it cannot recommend the iPhone 4 because of the device’s antenna issues, it carries a lot of weight with mainstream consumers.

Hardcore iPhone fans can try as much as they’d like to discredit the Consumer Reports findings - and some are already doing just that - but they’ll have a hard time convincing mainstream consumers that CR is turning this into something more than it is. After all, this isn’t just some thumbs-down from a tech blogger who had a bad experience with the iPhone. This is Consumer Reports - and that matters.

If someone could come up with an iPhone 4 app that triggers "don't touch me" maybe that would help.

Even though all the noise is about dropped calls.  I wonder how the data transmission rate is affected even if you don't drop a call.  Lower signal strength would slow data transfer and put the iPhone 4 in a higher power consuming state for a longer period, resulting in lower battery life.

I don't have any plans to upgrade my iPhone 3GS.

Read more

Attending DataCenterDynamics SF, July 16

I'll be at my favorite data center event, Data Center Dynamics in SF on July 16.

image

image

Some interesting topics are:

Industry Executive Roundtable - Are We Reaching an Inflection Point in Our industry?
Challenging Pre-Conceptions of How Data Centers and IT Infrastructure Are Designed, Built and Operated.

 

Executive Roundtable: Game Changers – The Impact of the Cloud, Unified Computing and Applications

 

The Model Data Center:
Operational Management of Data Centers through Simulation
Sherman Ikemoto, General Manager, North America - Future Facilities Inc

 

If you haven't gone to a DCD conference you're missing out on a chance to connect with your peers in the area.

Read more

Analyst predicts how music Droid will eat Apple's lunch

Barron's reports on an interview with Charter Equity Research Managing Director Ed Snyder.  Who is Ed Synder?

Snyder is a former telecom engineer, who has been covering the telecom industry since Alexander Graham Bell called for Watson. And I have found him mostly right about things telephony, with wires or without. One of his basic tenets throughout the evolution of wireless phones has been that music is the killer application. The key to Apple's (ticker: AAPL) strategy of linking the iPod Touch, iPhone and iPad with one operating system, the iOS family, has been iTunes' central role in managing music, applications and software updates. The easy, seamless ability to transfer music from the iPod via iTunes to the first iPhones was a huge factor in the Apple smartphone's acceptance and continued success. That, in turn, is driving iPad sales.

Ed brings up Music as the killer app for Google.

Now, Snyder suggests that music is the application that could provide Google's (GOOG) open-source Android OS the chance to leap over Apple. The analyst predicts that the next-generation music platform, which is likely to be cloud-based, will be the major battlefield in the smartphone war over the next year or so.

And mentions data centers as a key to Google's strategy.

Snyder says that Google must offer a content-delivery system similar in function to iTunes, but based in a cloud—meaning music is stored in one of Google's famous data-center clusters somewhere and delivered via the Internet and over airwaves to various devices. (ITune libraries sit on the local hard drive of personal computers). He thinks that Google should strike deals with (or, I suppose, buy) one of the many cloud-based streaming-music services already used on wireless devices.

Smartphones, Music, and Data Centers are Google's opportunity to eat Apples' lunch.

How a Droid Could Eat Apple's Lunch

By MARK VEVERKA | MORE ARTICLES BY AUTHOR(S)

Apple's iPhone reigns supreme, but a veteran telecom analyst argues that the momentum belongs to Google's Android system.

APPLE 'S IPHONE IS THE undisputed king of the smartphones, but there is swelling sentiment that Google's Android platform may steal the crown in the end.

Read more

I built my datacenter in 5 minutes - AWS sticker

AWS has a trade offer for AWS fans. 

Amazon will send you the following stickers in exchange for.

  • Some stickers from your company or group.
  • A picture of your team, perhaps enhanced with your company or product logo.
  • An interesting piece of SWAG.
  • A blog post detailing the ways in which your company puts AWS to use, complete with an architecture diagram.
  • If you'd like some stickers, send us your offering and include a self-addressed envelope (we'll take care of the postage) to the following address:

    Amazon Web Services
    Attn: AWS Stickers
    P.O. Box 81226
    Seattle, WA
    98108-1300

    Hopefully, by writing this blog entry one of my AWS friends can get me some stickers. :-)  I want the datacenter one.

    Read more

    Reliable data center power, do you think about cybersecurity threats on power plants and the grid?

    About 4 years ago I met some interesting folks from Idaho National Laboratory, a DOE group at an OSIsoft user conference who work on cybersecurity threats on power plants and the grid.  Information Week covers NSA joining the cybersecurity threat.

    NSA Launches Infrastructure Cybersecurity Program

    The "Perfect Citizen" program will seek to help mitigate cyber attacks on critical infrastructure like power plants, air traffic control systems and the electrical grid.

    By J. Nicholas Hoover
    InformationWeek
    July 9, 2010 08:00 AM

    The National Security Agency plans to launch a program aimed at assessing vulnerabilities and developing capabilities to help secure critical infrastructure like power plants, air traffic control systems and the electrical grid.

    In an e-mail sent Thursday evening to InformationWeek, NSA refuted parts of an earlier Wall Street Journal report that the effort, called Perfect Citizen, would monitor communications or place "sensors" on utility company systems, instead calling it "a research and engineering effort."

    The Idaho National labs has a web site with their efforts.

    National Security

    SCADA/Cyber/Power Grid Security

    INL National SCADA Test Bed web site

    Comprehensive computer and cyber security programs are an essential element for today’s personnel computers as well as for the digital control systems that operate our nation’s infrastructure systems such as transportation and telecommunication systems and facilities such as chemical and water treatment plants.

    Leveraging the Laboratory’s more than 50 years of experience in developing, operating, and maintaining complex control systems for nuclear reactors and other infrastructure systems, the INL created a Critical Infrastructure Test Range complete with full-scale infrastructure systems, remote and secure testing grounds, and an expert staff to aid the utility and control systems industry in developing tools and solutions to improve cyber security.

    In 2004, the departments of Energy and Homeland Security established two multi-year programs at INL to protect the nation’s infrastructures against attacks from hackers, virus writers, disgruntled employees, terrorist organizations and nation states.

    The National Supervisory Control and Data Acquisition (SCADA) Test Bed is funded by the Department of Energy and works in collaboration with Sandia National Laboratory to systematically analyze, test, and improve cyber security features in the control systems that operate the nation’s electric power grid. SCADA systems are also commonly found in the water and oil and gas industry.

    And there is Department of Homeland Security site as well.

    Control Systems Security Program (CSSP)

    The goal of the DHS National Cyber Security Division's CSSP is to reduce industrial control system risks within and across all critical infrastructure and key resource sectors by coordinating efforts among federal, state, local, and tribal governments, as well as industrial control systems owners, operators and vendors. The CSSP coordinates activities to reduce the likelihood of success and severity of impact of a cyber attack against critical infrastructure control systems through risk-mitigation activities.

    What is the gov'ts role and who should you contact to understand the cybersecurity threats to your power infrastructure?

    Even so, the program raises unanswered questions about the government's role in -- and undefined turf over -- protecting the nation's critical infrastructure from cyber attacks, what technologies and processes might be used in such an effort, how any such effort would protect critical infrastructure owners' independence as well as privacy, and whether the effort should be public rather than classified.

    I need to go back and find the business cards for the Idaho National Lab guys I talked to.  I think there would know some answers.

    Read more