December 15, 2010

You have no secrets

Privacy? No way. Government, business and even the kid next door know what you're up to.

Headbone connects to the headphones
Headphones connect to the iPhone
iPhone connected to the Internet
Connected to the Google
Connected to the government.

—M.I.A., “The Message”

You are being watched.

Your Facebook friends are watching you. So are their Facebook friends, and total strangers. The guys who run Facebook, too. Your keystrokes are being logged. Your mouse-clicks are being monitored and digested. Your behavioral patterns are being analyzed, monetized: what you buy on Amazon, who you follow on Twitter, where you say you eat on Yelp, your most shameful Google searches.

The photos you post on Flickr are encoded with little bits of geospatial metadata that pinpoint where they were taken and can reveal where you live. Your smartphone—jam-packed with apps coded by who-knows-who and potentially loaded with spyware—is a pocket homing beacon, trackable by satellite. There are trucks with cameras on their roofs, trundling past your apartment, duly noting your unsecured Wi-Fi signal.

Wal-Mart is putting radio frequency identification (RFID) tags in your underwear.

You can barely remember all the different passwords to the ever-proliferating number of websites to which you’ve entrusted personal photos and videos, likes and dislikes, credit-card info and your Social Security number. Then there are the photos of you that other people have posted without your knowledge, or the things they may have written about you on blogs or message boards—things that have a good chance of remaining online and searchable for perpetuity.

And that’s to say nothing of the vast and classified surveillance apparatus—“so large, so unwieldy, and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it, or exactly how many agencies do the same work,” according to the Washington Post—that could (who knows?!) be silently taking note of the e-mails you’ve sent and the phone calls you’ve made.

Facebook, keeping tabs on its 500 million members—who share 30 billion bits of information each month yet are mostly ignorant of its privacy policy, which is longer than the United States Constitution—looks like a Class of 1984 high-school yearbook by comparison.

Public is the new private

Over just the past decade or so, the Web has turned things upside down. As Danah Boyd said, speaking in the spring at SXSW in Austin, we’ve seen “an inversion of defaults when it comes to what’s public and what’s private.”

Time was, what you said and did was “private by default, public through effort,” said Boyd, a fellow at Harvard’s Berkman Center for Internet and Society. That’s all changed: “Conversation is public by default, private through effort. You actually have to think about making something private because, by default, it is going to be accessible to a much broader audience . . . And, needless to say, people make a lot of mistakes learning this.”

To a degree unheard of even five years ago, we live our lives mediated by Firefox browsers and Droid screens. And that means—whether it’s ostensibly protected sensitive data (financial and medical data), ostensibly inconsequential personal data (Flickr photos, YouTube channels, Twitter feeds), or ostensibly de-personalized behavioral data (browsing patterns, search queries, HTTP cookies)—our lives are nowhere near as private as we might presume them to be.

“Precisely because the tech advances have come in so many places, it’s really quite hard to pick any one particular spot that’s the biggest problem,” says Lee Tien, senior staff attorney at the Electronic Frontier Foundation. “They all converge. Because we have a giant personal information superhighway, where all of our information travels around both the government and the business sector, what gets picked up in one place is being transferred to another place. So it all ends up, not necessarily in a central basket, but in a lot of different baskets—where it can always be accessed.”

“Data collection is becoming ubiquitous,” says Jules Polonetsky, co-chair and director of the Future of Privacy Forum, and former chief privacy officer at AOL. “It’s not science fiction anymore to think there are lots of databases that have everything we’ve done: every search we’ve done, every website we’ve visited.”

It might be comforting to think that our online identities are just anonymous strings of ones and zeros, but that’s just not true anymore. So what we used to loosely define as “privacy”—an admittedly amorphous concept—is changing fast. And only recently do consumers, voters, politicians, and the media seem to be grasping that fact.

Before, “we had privacy from obscurity,” says David Ardia, another fellow at the Berkman Center, and the director and founder of the Citizen Media Law Project. Now, almost everything worth knowing about almost anyone is online. 

“That means it’s searchable, and it’s available forever. And I don’t think we’ve caught up to that change in the way we structure our lives and the way we understand privacy.”

‘They want to know more about us’

To begin with, privacy is a problematic notion.

“It’s a very misunderstood concept from a constitutional point of view,” says civil liberties attorney Harvey Silverglate. “There are some parts of the Constitution, and of the Bill of Rights in particular, that are quite specific about it. And there are others that are quite general and amorphous.”

While the First Amendment is very explicit, for instance (“Congress shall make no law…”), the Fourth Amendment (“unreasonable searches and seizures”…“probable cause”) leaves a lot more wiggle room. It’s “seemingly intentionally vague,” says Silverglate—as if “left for the particular era and particular culture to define.” The result is a wording that suggests people are entitled to a reasonable degree of privacy—but just what it is differs in any given environment.

Obviously, the Framers “didn’t envision the Internet or telephones, but they obviously understood that this was an area that was going to be evolving, and they couldn’t define it.”

And so we find ourselves, at the beginning of the second decade of the 21st century, still trying to figure all this out.

The problem, says Silverglate, “is that the pace of technological change is proceeding so quickly that the courts, which were always a little bit behind in the development of technology, are now being left in the dust.”

Indeed, says Tien, “technology has advanced and the law has not.” Moreover, “Privacy is not easy to define. It means different things to different people.” But above all else, he says, the most acute threat nowadays is that both the government and the private sector have such vested interests in chipping away at whatever privacy actually is.

“You and I might view the information that we give off online, that we don’t want others to capture, as a negative thing like pollution in the air,” says Tien. But “for government and industry, it’s a nutrient. It’s something they can feed on. They want to know more about us.”

No such agency

“A hidden world, growing beyond control,” wrote Dana Priest and William Arkin in their Washington Post special report, “Top Secret America” —describing “some 1,271 government organizations and 1,931 private companies [working] on programs related to counterterrorism, homeland security, and intelligence in about 10,000 locations across the United States. An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances.”

If you don’t think a goodly number of those folks are listening in to the occasional Skype conversation, you haven’t been paying attention these past 10 months.

“I’m worried about a number of phenomena,” says Silverglate. “First, because of the increasing number of searches being done by the terror warriors—the CIA, the NSA, the FBI, and God knows who else—the chaos in the federal investigative establishment is unbelievable. If you think they can’t get the mail delivered on time, just think about the wiretaps and the electronic surveillance.”

It’s enough to make the most intrusive data-mining operation seem tame by comparison. After all, says Silverglate, a corporation “can spy on you but they can’t arrest you.” And when they do spy on you, it’s “because they want to sell you something, not kill you.”

Don’t (just) worry about the government

The problem comes when governments start strong-arming those companies into doing their bidding. Consider the controversy surrounding AT&T’s cooperation with the NSA (National Security Agency), without the knowledge of its customers, on a “massive program of illegal dragnet surveillance of domestic communications” (as the Electronic Frontier Foundation charged) back in 2006. “AT&T just allowed them access to the control room,” marvels Silverglate.

The Feds, in other words, “enlist the brilliance and expertise of companies like Google for the purposes of snooping on its citizens.”

It’s a job at which Google has allegedly acquitted itself quite well in recent months.

In May, news broke that the omnipresent (and sometimes seemingly omnipotent) corporation had been vacuuming up data about citizens’ Wi-Fi networks and what sorts of content was being accessed thereon. Like in a B-movie stakeout, it was all monitored from inside a van—those camera-equipped Street View trucks that patrol the world’s cul-de-sacs and capture images of sword-and-sorcery LARPers, “horse boy,” and, well, your front door.

Google insists that the data sweeps were “unintentional” and that at any rate, were only viewed a very limited number of times, by mistake. You’re not the only one who’s dubious. Massachusetts Congressman Ed Markey has asked the Federal Trade Commission (FTC) to determine whether Google’s privacy breach broke the law. Galaxy Internet Services, an ISP based in Newton, Massachusetts, has brought suit. And Connecticut Attorney General Richard Blumenthal is heading a multi-state investigation.

In June, Representative John Conyers of Michigan requested that Google CEO Eric Schmidt enlighten him as to just how those cars came to intercept that Wi-Fi info. In his letter, Conyers got out the virtual police tape, asking that Google “retain the data collected by its Street View cars, as well as any records related to the collection of such data, until such time as review of this matter is complete.”

It was about this time that Conyers sent a letter to Mark Zuckerberg, Facebook’s twerpy bazillionaire of a CEO, inquiring whether the site shared user data “without the knowledge of the account holders.”

But however much kerfuffle there was about Facebook’s Orwellian Beacon program or its labyrinthine privacy settings , no matter how sinister David Fincher’s movie The Social Network makes Zuckerberg’s enterprise seem, when it comes to privacy, Facebook is probably the least of your problems.

Sure, it’s bad. “The interplay between the multiple options is so complex” on Facebook, says Polonetsky. “Your location. What apps you use. Your friends’ apps. Different segments of your profile. Your contact information. It’s this incredibly complicated maze. Even I gotta sit sometimes and think before I answer a question.”

But too few people realize that this stuff is everywhere these days.

“You go to a site and there’s a lot going on!” says Polonetsky. “A lot of different data being collected. Regular cookies. Flash cookies. Behavioral retargeting. Analytics. There’s data being sent to an ad exchange. There might be an affiliate program because they’re selling ads not on a click basis, but on a commission basis. There’s 20 or 30 places your browser may go when you visit a site, and then [there’s] all the different things you have to do if you want to turn that off. Your cookie settings. viagra discount Your Adobe Flash player settings. You could spend hours just disabling the data transmission that happens.”

Anonymous Rex

The omniscient eye of corporate-abetted Big Brother may get the blockbuster treatment in the Post. But oftentimes privacy intrusions grow much closer to home—and are much more damaging.

“We used to think of the threat as ‘us against them,’” says Tien. “Now, because of the Internet and ubiquitous portable devices, there’s a much more lateral threat as well.” After all, “kids can ruin each other’s privacy without really even trying. They think they’re just in a Facebook squabble, but there are a lot of other people who have access to that data. So there’s both a Big Brother problem and a Little Brother problem. And that Little Brother problem has gotten worse.”

Who is Little Brother? He’s all those people you know, sort-of-know, or wish you didn’t know: creepy, barely remembered high-school classmates; Machiavellian coworkers; your angry ex. But mostly you really don’t know who Little Brother is, because Little Brother is anonymous. He or she is part of a sea of nameless faces: the anonymity-emboldened tough guy on a message board, or an auteur posting a sadistic video on YouTube, or an obsessive Twitter-stalker, or, sometimes, a malicious suburban mom hiding behind a hoax identity while taunting a teenager to suicide.

Inexorably, we seem to be drawn to a battle between two conflicting notions—and the winner of that battle may determine what kind of Internet we end up with. The voices advocating for increased privacy protections argue that our actions online should remain invisible—unless we give our express consent to be watched and tracked. But some of the most powerful voices on the Web are beginning to suggest that you should be held responsible for your online actions: that your anonymity on the Web is dangerous.

Speaking at the Techonomy conference in Lake Tahoe a couple of months ago, Google’s Schmidt opined that the rise of user-driven technology—and the dangers posed by those who would misuse it—required a new approach. “The only way to manage this is true transparency and no anonymity,” he said. “In a world of asynchronous threats, it is too dangerous for there not to be some way to identify you. We need a [verified] name service for people. Governments will demand it.”

And Schmidt is right. The same governments that are investigating Google’s breaches of their citizens’ privacy are also demanding that their citizens be accountable for their online identities in ways that must make the world’s totalitarian regimes smile. That’s the paradox: Any measure that would allow Google to track the sources of a Chinese hacker attack would also enable the Chinese government to track its own dissidents.

Even on our shores, a look at recent government action on privacy shows how confused the issue has become.

On the one hand, US lawmakers and the nation’s top consumer-protection agency are so spooked by online marketing practices that they are threatening legislation if the industry doesn’t begin to self-regulate. By doing so, they’re affirming the public’s right to retain its anonymity.

Earlier this year, the FTC began floating the idea of a no-track list, which would prevent advertisers from gathering information from a user’s online behavior much as the federal Do Not Call list restricts the practices of telemarketers. The ability of marketers to track you has shifted so quickly, and the information they can glean is so frighteningly accurate, that in July, Congress hauled a who’s-who of the Interwebs, including representatives from Google, Facebook, Apple, and AT&T, in front of the Senate Commerce Committee, threatening to push bills through both the House and the Senate if the industry didn’t start explaining to consumers what information is being collected and how it’s being used.

After the Senate hearings, Massachusetts Senator John Kerry announced that he would draft legislation (to complement bills already introduced in the House) that would give people more control over how their information is collected and distributed online.

“Take the single example of a cancer survivor who uses a social network to connect with other cancer survivors and share her story,” said Kerry in a statement. “That story is not meant for her employer or everyone she e-mails, or marketers of medical products promising herbal cures. Misapplied and poorly distributed, this information could lead to a lost job opportunity or higher insurance rates. Even distributed without malice this information could pigeonhole her identity as a cancer survivor, which may not be how she wants to face the world.”

Deciding who gets that information “should be her right,” Kerry continues. “Whether or not she acts to protect its distribution, private firms should start with the premise that they should treat her and her information with respect. The fact that no law limits the collection of this information or its distribution is a problem that threatens an individual’s sense of self.”

That very month, however, the Obama administration tried to make it easier for the FBI to obtain records of “online transactions,” including a list of who you’ve e-mailed and what Web sites you’ve visited, without a warrant. Around the same time, the Electronic Frontier Foundation reported that the White House has circulated a draft of its plan for securing identity online, which calls for individuals to “voluntarily request a smart identity card from her home state” to “authenticate herself for a variety of online services” including “securely accessing her personal laptop computer, anonymously posting blog entries, and logging onto Internet e-mail services using a pseudonym.”

The proposal, called the National Strategy for Trusted Identities in Cyberspace, sounded alarming to some critics.

“If I’m posting on a blog, reading, browsing, who needs to know who I am? Why is it so important that my identity be verified and authenticated?” says Tien. “We have a tendency to say, ‘Well, gee, there are all these problems so we need to know people’s identity.’ But identity isn’t security. You don’t automatically know what to do about someone just because you know who they are.”

Contested concepts

At any rate, even a raft of new laws and legal precedents can’t be the only answer. Beyond legal remedies, there has to be a cultural component.

“Much of our sense of privacy in the world isn’t guaranteed by law,” says Tien. “It’s guaranteed by people acting within traditional bounds.” Unfortunately, “technology screws this up. It accelerates social change in ways where people aren’t sure what the norms are.”

Justin Silverman, a law student who blogs for Suffolk Media Law and the Citizen Media Law Project, says he suspects that ultimately people’s sensibilities will adapt as folks get “more comfortable with information online” and a lot these issues will “solve themselves.” In the meantime, he says, “the market will take care of some things.”

Indeed, even as they’ve helped create some of these issues, technology and the private sector have huge roles to play. People are starting to demand it. The Wall Street Journal reported recently that “companies with ideas on how to protect personal information”—firms such as Abine and TRUSTe—“are a new favorite of venture capitalists.”

A lot of Internet companies, according to Polonetsky, are simply saying, “I’ve had enough of this. I have some pretty big plans to do some pretty good things with technology, and I don’t want to be called a bad guy. I’m ready to have the practices that seem to be of grave concern taken off the table so I can roll things out.”

Even as the technology evolves, and legislators and courts and corporations slowly smarten up, and society gets more Web-savvy, some of this stuff will always be with us.

Tien mentions a phrase he likes from philosophy: essentially contested concept. That’s an idea that pretty much everybody recognizes and agrees exists in theory—“justice,” say—but on which there’s little concurrence about just what it is and how to achieve it.

“Privacy is essentially contested,” says Tien. “We want to protect our privacy, but there are grand incentives to know more about us. Combine this problem of competing incentives with the problem of how hard a problem it is to solve and how every era changes the technology: Even if the problem gets solved for the telephone it didn’t get solved for e-mail and it didn’t get solved for social networking. It’s always going to be work.”—Mike Miliard

Permalink • Print • Comment

The Ultimate Netbook Buyer’s Guide – Part 2

More Power, Scotty!

At this point, manufacturers are attempting to blur the lines between netbooks and notebook computers in several ways. First, Intel has continuously re-engineered the Atom CPU to run faster, do more work per clock cycle and consume less power. The previous generation N280 was the first to receive Intel’s HyperThreading technology which basically tells Windows there are 2 processors even though there is physically one. In other words, it helped with multitasking navigation. Now there is even more horsepower in their latest processors which not only have HyperThreading, but are now dual-core powered. What this means is that the newest Atom-powered netbooks will have 2 physical CPUs but Windows will see 4 CPUs which amplifies the netbook’s muscle. However, you should still determine your computing needs so you don’t find out the hard way that you need something bigger, that has faster performance and more RAM plus a bigger hard drive.

E-Atkins Diet

You’ll also notice that netbooks are starting to get thinner and lighter. Thanks to Apple’s ultraportable laptop, the MacBook Air, manufacturers are not only pushing the continued thin & portable design, but also integrate some of Apple’s aesthetic looks such as viagra directions the chiclet keyboard, brushed aluminum/plastic look and blending the mouse trackpad and its buttons into the palm rest area. Some mouse trackpads even support multi-gesture touch similar to Apple’s.

Endurance Mode!

In addition, earlier generation netbooks had 3-4 cell lithium-ion batteries which saved on costs. Now, manufacturers are bundling longer-lasting 6-cell batteries so you can expect an average of 8-10 hours of power cord-free computing.

Multimedia Horsepower

Addressing complaints with graphics-intensive tasks like flash (YouTube videos); Intel has decided to integrate the graphics card into its next-generation Atom CPU. Because the CPU and GPU (Graphics Processing Unit) are in the same place and work together, streaming video and movies on your netbook will be more enjoyable. AMD is also jumping in and getting more aggressive with their next-generation Fusion (code-named Brazos) processors which have been shown in benchmark tests to be more than a match for Intel’s Atom (with nVidia’s Ion) processors.

The Brands

One fundamental consideration on netbooks (and other technology) is that they’re all built in China by a handful of ODM (Original Design Manufacturers). So pick your favorite computer brand, HP, Apple, Dell, MSI, etc., these OEM’s (Original Equipment Manufacturers) contract with ODM’s such as Quanta, Compal and Foxconn to mass-produce the OEM’s products. Since they all roll out of the same factories, the argument that one netbook is better than another based on build quality doesn’t hold much weight. However, consumer preference and brand image are strong influences when customers ask their friends and family for advice. For example, many people fancy Apple’s elegant brushed aluminum look on their notebooks. Others prefer ASUS’s unique styling and their innovation considering they blazed the trail for the netbook genre.

In addition to consumer preference/styling, there are a couple of other elements to consider when deciding on brand. Does the brand(s) offer a reasonable warranty? Sure it may come with 1 year parts coverage but some brands offer only 90 days labor so you’ll be billed for labor performed if your netbook has to be repaired 6 months after purchasing it. Second, you can ask the salesperson or on-duty technician which brand(s) of netbooks that have a consistent pattern of being returned or brought in for repairs. If you’re shopping online, most retailers offer customer reviews where you can view previous customer purchases (both good and bad) which can help gain some insight on the brand’s performance.

What to Look For

For your next netbook, you should make sure the CPU is at least an Intel Atom 450. In other words, ask the salesperson if the netbook in question has HyperThreading (they’ll know what this means). This equates to quicker switching between multiple programs and better overall system performance. If you’re looking for extra horsepower, ask the salesperson for a Dual-Core netbook (i.e. Intel Atom N550 CPU)

Most netbooks now come with Windows 7 Starter edition. Keep in mind that there is a reason why it’s called “Starter” edition. This flavor of Win 7 has reduced functionality in exchange for running leaner and eating up less system resources during operation. For example, you’re not allowed to change the default Windows blue logo background wallpaper. Not that it should be a dealbreaker on a netbook purchase but netbook makers were shooting for the computing essential which is why Win 7 is the familiar operating system of choice.

Most current netbooks are fast enough with 1 GB RAM (max is 2 GB) so you might see a significant price increase for 2 GB RAM (or 2 GB upgrade). In addition, the standard 160-250 GB hard drive remains mainstream since many users have their netbooks as a supplemental computer for quick tasks.

Also keep in mind that by default, netbooks do not have Microsoft Office installed unless it comes pre-installed from the factory. They also don’t have optical drives (DVD/DVD+/-RW drives) so if you wanted to install your own copy of MS Office, you would need to buy an external DVD drive. Another crucial heads-up is that some netbooks have a copy of MS Office STARTER version installed. These are 90-day use programs and can be unlocked to unlimited time but you must purchase a license. Of course, you’re welcome to purchase a netbook with MS Office pre-installed but the usual increase in the netbook’s purchase price is about $150-$299. (The cost of MS Office)

Office Starter is Microsoft's replacement for Microsoft Works.  Like Works, Office Starter comes with Word & Excel but with limited usage.  It does not include Outlook and PowerPoint but it does not have a license that needs to be renewed.  This version has built-in advertisements that take care of the license fees.

Most netbooks have a 10.1” LCD monitor but you’re welcome to opt for a larger 11.6” screen and more premium features like nVidia’s Ion graphics which help improve multimedia applications. Just remember that these extra features will increase the cost of a netbook such that it approaches $380-$450 which is the starting cost of normal-sized (and full-featured) 14-16” notebook computers.

If you need additional connectivity, you can opt for a netbook with Bluetooth which is perfect if you find yourself somewhere without local internet access like free coffee shop Wi-Fi. Bluetooth allows you to tether your cell phone (if you have a tethering data plan) and also supports other devices like Bluetooth mice and printers, etc.

Regardless of what you’re looking for in a netbook, the big picture is to know the computing reasons for your netbook purchase so you know what to look for and avoid what you don’t need and end up overpaying or being disappointed.

Permalink • Print • Comment

The Ultimate Netbook Buyer’s Guide – Part 1

Netbooks, laptop computers and ultra-portables, oh my! With the rush of all these new devices, deciding which type of computer would fit your lifestyle and computing needs can be confusing. However, this guide was created to explain and clarify the details, misconceptions and trends of netbooks and some of the cheap netbooks that have emerged.

This is the first part of the netbook buyer’s guide which starts off with some history and clears up several confusing aspects of netbooks.

What are Netbooks?

Right around 2007, Asus realized that some consumers use their desktop PC for just quick and easy emailing, web browsing and Microsoft Word. Obviously, technology has advanced considerably since the creation of email, web browsing and MS Word, so Asus found an opportunity to create the Eee PC. Thus, the netbook category was born!

There are several crucial points that should be made with netbooks which distinguish them from standard notebooks:

  • They are designed for quick email checking, casual web browsing and light typing
  • They are engineered for minimal power consumption because of the above reasons
  • They are built to complement (not replace) full-size notebooks
  • Because of their limited utility, their components are relatively cheaper and therefore have a lower purchase price ($280 – $500) than traditional notebooks
  • They are designed to be highly portable and have significantly longer battery life because of their low-power consumption

viagra directions for use 5px 4px 10px; font-family: Verdana, Geneva, sans-serif; color: #000; font-size: 90%” align=”justify”>
Problems and Purpose

While Asus was praised for its netbook innovation, there were several issues that surfaced since the introduction of their Eee PC. First, retailers were pushing netbooks sales on the premise of its low cost and small footprint. The result was that consumers became misinformed and started to return their netbooks because they became frustrated attempting to do more tasks than what the netbook was designed for.

Second, there is a misconception that netbooks are just as fast as their standard notebook counterparts. So a 1.66 Ghz Intel Atom N450 may run literally as fast as a 1.6 Ghz Intel Core 2 Duo processor, but the Core 2 Duo was engineered as a performance chip with more horsepower per clock cycle so it will outperform the Intel Atom CPU on all applications.

(Kind of like how a Ford F150 (2011) and a Lexus IS-F (2011) are both rated at 400+ hp but would have significantly different 0-60 mph and quarter-mile times.)

Some complained that other performance issues included having difficulty ALT-Tabbing between Word, Excel, FireFox and Outlook. Again, netbooks were NOT designed with considerable multi-tasking in mind. They are designed for a person who wants to quickly check an email at a coffee shop, or a writer trying to post a quick blog or a student who wants to put the finishing touches on his/her term paper. Consumers were even complaining that netbooks struggled to stream YouTube videos successfully. Of course they would because a netbook’s video chipset was designed to eat up as little power as possible, not run web videos.

In an attempt to minimize production costs and keep the purchase price low, netbook makers had to cut several corners in order to still make a profit. For example, early netbooks featured Linux operating system instead of Windows so manufacturers wouldn’t have to pay licensing fees to Microsoft. Also, first-generation netbooks had small 4-8 GB SSD (solid-state drives) hard drives and the RAM (and HDD) would be soldered onto the motherboard which all contributed to a lower cost.

One other conflicting issue with netbooks is its selling cost.  Originally, ASUS wanted a $199 price point but was forced to increase it to $299-$350  in order to sustain profitability after confirming the hardware for mass production.  Second, current netbook prices range from $299 all the way up to $500-$600.  Many speculate that instead of spending $299-$350 for a netbook, you can spend another $30-$50 for a full-featured (and bigger-screen) full-size notebook computer which offers a more-bang-for-your-buck mobile computing solution.

Netbooks vs. Ultra Portables

There is also an apparent confusion between the netbook and ultra portable notebook categories. First, ultra portable laptops have been around for a while. If you examine Sony and Dell’s older ultra-portable laptops, you’ll see a pattern of their tiny notebooks having the following specs:

  1. 10-13” LCD screen
  2. A mainstream CPU (i.e. Intel Pentium M, Core 2 Duo, etc.)
  3. 2-4GB RAM
  4. 320-500GB Hard Drive
  5. An extended battery for longer run times
  6. A significantly higher price tag (i.e. $600-$2500)

These specs are the basis for the ultra-portable category. Examples include the Dell Latitude X300, Fujitsu Lifebook P5000, Panasonic Toughbook W-2, Alienware M11x and the Toshiba Portege R700-S1330. The idea is to provide virtually the same (or near the same) computing horsepower as a normal-sized laptop in a highly portable size with an extended run time. So with that being said, the misconception that Apple’s Macbook Air is a netbook is false. Considering the requirements to qualify for a netbook, the Macbook Air is Apple’s ultra-portable laptop.

Netbook Hardware trends

A netbook’s specifications will be considerably lower than a full-size notebook because one of the fundamental premises of netbooks is extended (or also called all-day) battery life. Hence, netbooks will have the following specs in common:

  1. Low-voltage CPU (i.e. Intel Atom which is designed for minimal power consumption)
  2. Usually 1GB RAM – Enough to run Windows comfortably and 1-2 applications but that’s it
  3. 160-250GB Hard Drive – Hard drive size price-per-storage has become very cost-effective for PC makers so a 250GB hard drive in a $300-$350 netbook is common
  4. 8-11” LCD Screen – netbooks feature extreme portability and a very small footprint
  5. No DVD-CD Drive – In order to reduce size and increase battery life, netbooks don’t have optical drives. In addition, manufacturers realized that casual web browsing & email checking do not require a DVD drive.
  6. Webcam + Wi-Fi + 1-2 USB ports – These are the basic amenities that come standard with both notebooks and netbooks

If you’re in the market for a new computer and can’t decide between a netbook, notebook and ultra-portable, you should examine the reason(s) for your upcoming computer purchase and determine whether you need something for quick emailing, something with moderate horsepower & size or a power-hungry monster desktop-replacement if you’re looking to camp out at your local coffee shop.

Permalink • Print • Comment
Made with WordPress and a healthy dose of Semiologic • Sky Gold skin by Denis de Bernardy