BTemplates.com

Powered by Blogger.

Pageviews past week

Quantum mechanics

Auto News

artificial intelligence

About Me

Recommend us on Google!

Information Technology

Popular Posts

Showing posts with label Wi-Fi. Show all posts
Showing posts with label Wi-Fi. Show all posts

Wednesday, October 5, 2011

India to launch $45 tablet computer



India is set Wednesday to launch its long-awaited low-cost computer, a $45 tablet device designed to bring the information technology revolution to tens of millions of students.
Indian customers visit the computer section at the Croma electronics mega-store in Mumbai in September 2011. India is set Wednesday to launch its long-awaited low-cost computer, a $45 tablet device designed to bring the information technology revolution to tens of millions of students.

The touchscreen computer has a seven-inch (18-centimetre) screen, Wi-Fi Internet access, a media player and 180 minutes of battery power, according to official specifications.

Called the "Akash" ("Sky"), the locally-made device will be launched in New Delhi by Human Resources Development Minister Kapil Sibal after years of delays.

"It will cost 2,200 rupees ($45) and the first batch of 500 tablets will be handed over to students after the release," ministry spokeswoman Mamata Varma told AFP.

"Initially, 700 Akash tablets will be made every day and we expect the production to pick up when more companies join in to manufacture the device," she said.

The commercial marketing strategy for the Akash remains unclear, but most of the computers are likely to be sold through universities and colleges rather than shops.

Canada-based Datawind, the current manufacturer, said the tablet used an Android 2.2 operating system, had video-conferencing capability, two USB ports and a 32GB expandable memory.

But experts warned its 256-megabyte random access memory (RAM) would limit performance.

Commercial manufacturers are hoping Indian customers will leapfrog personal computers to buy tablets, as millions did by buying mobile telephones instead of waiting for a landline.

Apple's internationally-popular iPad computers costs a minimum of $600 in India, with competitor Reliance Communications selling a rival tablet device at about $290.

The Akash is part of a push to increase the number of students in higher education and to give them the technological skills needed to further boost the country's recent rapid economic growth.

India, where the 61 percent literacy rate lags far behind many other developing nations such as China with 92 percent, is making major efforts to improve its education system.

The government had promised to release the first 100,000 Akash computers by January 2011, but uncertainty over the level of government subsidy is thought to have delayed mass production.

The much-hyped "computer for the masses" was said to be on the brink of release in both 2005 and 2009 -- only for it never to materialise. Industry observers say rising labour charges, cheap imports, and more sophisticated tablets could undermine the Akash among India's tech-savvy youngsters.

Sunday, July 3, 2011

A Tablet that Wants to Take Over the Desktop


Cisco has redesigned the Android operating system to make a tablet that also works as a desktop computer—but it takes some control away from users.
New look: The Cius tablet features a radically
different version of Android.
Credit: Cisco.

The latest entrant in the increasingly crowded tablet computing field, Cisco's Cius, is bulkier than the iPad, and has a smaller screen (7-inches wide, compared to the iPad's 9.7). But it packs a number of tricks all of its own, designed to woo business users. The Cius is designed to integrate closely with Cisco's voice and video phone systems, and it can even replace a desktop computer when docked to a new Cisco deskphone, which connects to a monitor, keyboard and mouse.

A Cius tablet makes a user's desk number mobile, enabling a person to make and receive voice and video calls anywhere, if their company has a Cisco phone system. The tablet features HD quality cameras front and back and can be used with a Bluetooth headset for more private calling. The tablet can also be used as a desktop videoconferencing device when docked on a special desktop phone, and can smoothly switch between a WiFi a cellular network connection.

That dock can also be plugged into a monitor keyboard and mouse to act like a desktop computer. "It can replace my desktop operating system," says Tom Puorro, senior director for Cisco's collaboration technologies.

The Cius runs Google's Android mobile operating system, which is used on a rapidly growing number of smartphones and tablets as well. Android is open source, meaning it can be modified by anyone for free, yet so far most companies that have built gadgets running Android have tinkered with it little. The Cius, in contrast, features a radical reworking of Android.

This gives an IT department much greater control over what a Cius user can do. IT managers can shut down access to the Android app market to protect a company from malicious apps. Cisco has also created its own app store, AppHQ, that contains only apps deemed stable and secure by Cisco. Companies can even create their own app store within AppHQ and limit employees to certain applications, or apps built in house.

A WiFi only version of the tablet will be available worldwide from July 31 at an estimated price of $750. Cisco will sell it along with related services and infrastructure, so the cost to businesses will vary, and could be as low as $650. AT&T and Verizon will each offer versions for their 4G networks this fall.



A person can use the tablet's own OS or Windows even via a virtual desktop that runs in the cloud, as Puorro demonstrated at a launch event held in San Jose today. The tablet's powerful 1.6GHz Intel Atom processor allows desktop-like performance when hooked up to a keyboard, mouse and monitor. Although iPads are showing up in workplaces, they can't offer the same integration with everyday tasks like phone calls, and are limited to email, Web browsing and video, says Puorro.

Cisco worked with Google to get advice on its modifications to Android, says Puorro. These modifications enable Android to deal with video and operations like group calling and transferring calls, and make use of a dedicated chip in the tablet that encrypt all its data.
Desk mode: The Cius can be plugged into a new Cisco phone, and function as a desktop computer.
Credit: Cisco

However, the Cius lags other Android tablets in that it uses a now-outdated version of the operating system, code-named FroYo, which was intended only for phones. Cisco say they will catch up, but are waiting for the fall release of Android, code-named Ice Cream Sandwich, a version that Google says will seamlessly span phones and tablets.

Ken Dulaney, a VP and analyst with Gartner specializing in mobile devices says that Cisco has likely delivered something that none of the 200 or so other tablets launching this year can match. "Samsung's latest Galaxy Tab has much more advanced hardware," he says, "what Cisco has done is create a special case of Android that adds things the enterprise needs and is a unique combination of phone, tablet and videoconferencing device."

Other companies have hinted at plans for enterprise-friendly revamps of Android, says Dulaney, including Motorola, but none have so far yet delivered.

Although the Cius may not seem competitive with Apple's iPad 2 to consumers, to businesses concerned about their security it likely see distinct advantages. Apps such as MobileIron exist to help IT staff control iPads used by their staff, but Apple's operating system fundamentally limits the extent to which the iPad can be managed remotely, says Dulaney. "With Android, Cisco could go in at a low level and change how the device is managed so a company can manage everything for the user."

Without an existing investment in Cisco phone and communication systems, though, many company may see little appeal. Puorro says that Cisco continues to develop and release iPad and iPhone apps for its collaboration software, a strategy Dulaney says is wise. "Of course Cisco will also aggressively support iPads," he says, "I think they're gonna see how the Cius does, and if it doesn't work out, work hard to support the most popular tablets."

Friday, July 1, 2011

WiFi 'napping' doubles phone battery life


A Duke University graduate student has found a way to double the battery life of mobile devices – such as smartphones or laptop computers – by making changes to WiFi technology.
This is Justin Manweiler from Duke University.
Credit: Justin Manweiler

WiFi is a popular wireless technology that helps users download information from the Internet. Such downloads, including pictures, music and video streaming, can be a major drain of battery.

The energy drain is especially severe in the presence of other WiFi devices in the neighborhood. In such cases, each device has to "stay awake" before it gets its turn to download a small piece of the desired information. This means that the battery drainage in downloading a movie in Manhattan is far higher than downloading the same movie in a farmhouse in the Midwest, the researchers said.

The Duke-developed software eliminates this problem by allowing mobile devices to sleep while a neighboring device is downloading information. This not only saves energy for the sleeping device, but also for competing devices as well.

The new system has been termed SleepWell by Justin Manweiler, a graduate student in computer science under the direction of Romit Roy Choudhury, assistant professor of electrical and computer engineering at Duke's Pratt School of Engineering. The SleepWell system was presented at the ninth Association for Computing Machinery's International Conference on Mobile Systems, Applications and Services (MobiSys), being held in Washington, D.C.

Manweiler described the system by analogy: "Big cities face heavy rush hours as workers come and leave their jobs at similar times. If work schedules were more flexible, different companies could stagger their office hours to reduce the rush. With less of a rush, there would be more free time for all, and yet, the total number of working hours would remain the same."



"The same is true of mobile devices trying to access the Internet at the same time," Manweiler said. "The SleepWell-enabled WiFi access points can stagger their activity cycles to minimally overlap with others, ultimately resulting in promising energy gains with negligible loss of performance."

With cloud computing on the horizon, mobile devices will need to access the Internet more frequently -- however, such frequent access could be severely constrained by the energy toll that WiFi takes on the device's battery life, according to Roy Choudhury.

"Energy is certainly a key problem for the future of mobile devices, such as iPhones, iPads and Android smartphones," Roy Choudhury said. "The SleepWell system can certainly be an important upgrade to WiFi technology, especially in the light of increasing WiFi density."

Manweiler said that "the testing we conducted across a number of device types and situations gives us confidence that SleepWell is a viable approach for the near future."
Provided by Duke University

Monday, April 5, 2010

Hacking the Smart Grid


One researcher shows how your house's power could be shut down remotely, but the threat is only theoretical--for now.

Components of the next-generation smart-energy grid could be hacked in order to change household power settings or to spoof communications with a utility's network, according to a study of three pilot implementations.

The problems were highlighted in a presentation given last week by security researcher Joshua Wright of InGuardians, a consulting firm with many infrastructure companies among its clients. Vulnerabilities discovered by Wright could let attackers remotely connect to a device or to intercept communications with the managing power company.

The report caused a kerfuffle, and InGuardians has refused to disclose further details. However, one expert familiar with the content of Wright's presentation says that it highlights security problems with many devices. "These are fairly common mistakes," says Marcus Sachs, director of the Internet Storm Center, part of the SANS Institute, where Wright presented his research. "Most of the wireless meters are subject to the same vulnerabilities that we saw [in Wi-Fi devices] 10 years ago."

The power industry is in the midst of a massive rollout of smart-grid technologies fueled by $3.4 billion in stimulus funds. By delivering detailed usage information, smart meters promise to allow consumers to control their power usage and to enable power companies to better manage their distribution networks. Nearly 60 million smart meters--covering half of the U.S. households and businesses--are expected to be deployed this year, according to estimates by the Edison Foundation's Institute for Electrical Efficiency.

To help test the infrastructure, InGuardian's Wright created an open-source hacking tool, dubbed KillerBee. This tool lets security researchers test the security of the most popular wireless communications protocol for smart meters, a low-power wireless communications technology called ZigBee. This protocol has a longer range than Bluetooth and is the most popular way of creating a home-area network (HAN).

"It's how your meter--the gateway--will talk to your dryer, your thermostat, and your water heater," says John Shaw, senior vice president of products and technology at Industrial Defender, an infrastructure security company.

Researchers have previously warned that allowing network access to the home opens up a host of security issues. Last year, security firm IOActive found flaws in a smart-meter device that allowed its researchers to insert code into one device and have it spread to others--essentially, injecting a computer worm into a local power network.

"If you could get that meter to talk to its neighbors and those to talk to their neighbors, you could conceptually tell them to turn off and cause a fairly broad power outage," Shaw says.

The ZigBee Alliance, which oversees the protocol, has submitted its specification for smart-grid-specific communications to three separate security reviews, according to Bob Heile, the group's chairman. "What comes back is that [the specification] is okay, but there are always suggestions to make it better," Heile says. "We always implement those suggestions."

Using KillerBee, Wright found that some ZigBee devices exchange encryption keys in the open, allowing an eavesdropper to grab the information needed to clone a device, the researcher stated in a presentation given late last year at ToorCon, a hacking conference.

"He developed a suite of tools that allows (hackers) to do what they can do in the wired world," says the SANS Institute's Sachs. "If you have a radio that can receive ZigBee, then you can use these same tools."

Despite the latest research report, the threat remains theoretical for now. Smart meters are not yet attached to most households, device manufacturers are taking security more seriously, and utilities are testing their networks for vulnerabilities, says Industrial Defender's Shaw. Overall, the manufacturers and utilities have become better at talking to security researchers, he says.

"Yes, there are vulnerabilities there, but this is more of a public relations issue and a nuisance issue than a threat to the power infrastructure," Shaw says. He points to an industrywide agreement on a single process for upgrading software on the devices as a sign of progress.

David Baker, director of services for IOActive, another company that counts power companies and device manufacturers among its clients, also says that the industry as a whole is making progress. "The utilities are acutely aware of the issues and are trying their damnedest to fix the problems." Baker says. "It is getting really, really difficult to find these holes now."

Tuesday, October 13, 2009

Radio Waves 'See' Through Walls




University of Utah engineers showed that a wireless network of radio transmitters can track people moving behind solid walls. The system could help police, firefighters and others nab intruders, and rescue hostages, fire victims and elderly people who fall in their homes. It also might help retail marketing and border control.

On the left, a person walks around inside a square of 28 radio transceivers (mounted on plastic pipes) in the Warnock Engineering Building's atrium at the University of Utah. The person creates "shadows" in the radio waves, resulting in the image displayed on right, in which the person appears as a reddish-orange-yellow blob. University of Utah engineers also showed this method can "see" through walls to make blurry images of people moving behind the walls. They hope the technique will help police, firefighters and other emergency responders apprehend burglars and rescue hostages, fire victims and others. (Credit: Sarang Joshi and Joey Wilson, University of Utah)


"By showing the locations of people within a building during hostage situations, fires or other emergencies, radio tomography can help law enforcement and emergency responders to know where they should focus their attention," Joey Wilson and Neal Patwari wrote in one of two new studies of the method.

Both researchers are in the university's Department of Electrical and Computer Engineering – Patwari as an assistant professor and Wilson as a doctoral student.

Their method uses radio tomographic imaging (RTI), which can "see," locate and track moving people or objects in an area surrounded by inexpensive radio transceivers that send and receive signals. People don't need to wear radio-transmitting ID tags.

One of the studies – which outlines the method and tests it in an indoor atrium and a grassy area with trees – is awaiting publication soon in IEEE Transactions on Mobile Computing, a journal of the Institute of Electrical and Electronics Engineers.

The study involved placing a wireless network of 28 inexpensive radio transceivers – called nodes – around a square-shaped portion of the atrium and a similar part of the lawn. In the atrium, each side of the square was almost 14 feet long and had eight nodes spaced 2 feet apart. On the lawn, the square was about 21 feet on each side and nodes were 3 feet apart. The transceivers were placed on 4-foot-tall stands made of plastic pipe so they would make measurements at human torso level.

Radio signal strengths between all nodes were measured as a person walked in each area. Processed radio signal strength data were displayed on a computer screen, producing a bird's-eye-view, blob-like image of the person.

A second study detailed a test of an improved method that allows "tracking through walls." That study has been placed on arXiv.org, an online archive for preprints of scientific papers. The study details how variations in radio signal strength within a wireless network of 34 nodes allowed tracking of moving people behind a brick wall.

The method was tested around an addition to Patwari's Salt Lake City home. Variations in radio waves were measured as Wilson walked around inside. The system successfully tracked Wilson's location to within 3 feet.

The wireless system used in the experiments was not a Wi-Fi network like those that link home computers, printers and other devices. Patwari says the system is known as a Zigbee network – the kind of network often used by wireless home thermostats and other home or factory automation.

Wilson demonstrated radio tomographic imaging during a mobile communication conference last year, and won the MobiCom 2008 Student Research Demo Competition. The researchers now have a patent pending on the method.

"I have aspirations to commercialize this," says Wilson, who has founded a spinoff company named Xandem Technology LLC in Salt Lake City.

The research was funded by the National Science Foundation.

How It Works

Radio tomographic imaging (RTI) is different and much less expensive than radar, in which radar or radio signals are bounced off targets and the returning echoes or reflections provide the target's location and speed. RTI instead measures "shadows" in radio waves created when they pass through a moving person or object.

RTI measures radio signal strengths on numerous paths as the radio waves pass through a person or other target. In that sense, it is quite similar to medical CT (computerized tomographic) scanning, which uses X-rays to make pictures of the human body, and seismic imaging, in which waves from earthquakes or explosions are used to look for oil, minerals and rock structures underground. In each method, measurements of the radio waves, X-rays or seismic waves are made along many different paths through the target, and those measurements are used to construct a computer image.

In their indoor, outdoor and through-the-wall experiments, Wilson and Patwari obtained radio signal strength measurements from all the transceivers – first when the rectangle was empty and then when a person walked through it. They developed math formulas and used them in a computer program to convert weaker or "attenuated" signals – which occur when someone creates "shadows" by walking through the radio signals – into a blob-like, bird's-eye-view image of that person walking.

RTI has advantages. "RF [radio frequency] signals can travel through obstructions such as walls, trees and smoke, while optical and infrared imaging systems cannot," the engineers wrote. "RF imaging will also work in the dark, where video cameras will fail."

Even "where video cameras could work, privacy concerns may prevent their deployment," Wilson and Patwari wrote. "An RTI system provides current images of the location of people and their movements, but cannot be used to identify a person."

Would bombardment by radio waves pose a hazard? Wilson says the devices "transmit radio waves at powers 500 times less than a typical cell phone."

"And you don't hold it against your head," Patwari adds.

Radio 'Eyes' to the Rescue

Patwari says the system still needs improvements, "but the plan is that when there is a hostage situation, for example, or some kind of event that makes it dangerous for police or firefighters to enter a building, then instead of entering the building first, they would throw dozens of these radios around the building and immediately they would be able to see a computer image showing where people are moving inside the building."

"They are reusable and you can pick them up afterwards," he says.

The technique cannot distinguish good guys from bad guys, but at least will tell emergency personnel where people are located, he adds.

Patwari says radio tomography probably can be improved to detect people in a burning building, but also would "see" moving flames. "You may be able to look at the image and say this is a spreading fire and these are people," says Patwari.

Wilson believes radio imaging also could be used in "a smarter alarm system. … What if you put radios in your home [built into walls or plugged into outlets] and used tomography to locate people in your home. Not only would your security system be triggered by an intrusion, but you could track the intruder online or over your phone."

Radio tomography even might be used to study where people spend time in stores.

"Does a certain marketing display get people to stop or does it not?" Wilson asks. "I'm thinking of retail stores or grocery stores. They spend a lot of money to determine, 'Where should we put the cereal, where should we put the milk, where should we put the bread?' If I can offer that information using radio tomographic imaging, it's a big deal."

Radio image tracking might help some elderly people live at home. "The elderly want to stay in their homes but don't want a camera in their face all day," Wilson says. "With radio tomographic imaging, you could track where they are in their home, did they get up at the right time, did they go to the medicine cabinet, have they not moved today?"

Wilson says a computer monitoring the radio images might detect an elderly person falling down the stairs based on the unusually fast movement.

He says radio tracking also might be a relatively inexpensive method of border security, and would work in dark and fog unlike cameras.

Another possible use: automatic control of lighting, heating and air conditioning in buildings, says Wilson. Radio tracking might even control sound systems so that the best sound is aimed where people are located, as well as noise cancellation systems which could be aimed automatically at noise sources, Patwari says.
If you like this post, buy me a Pittza at $1!

Reblog this post [with Zemanta]

Wednesday, February 25, 2009

6 Promising tech start-up casualties


The new start-up companies are the worst-hit in the current global economic turmoil. Here we give the low-down on some such young companies that have fallen flat

The global economic slowdown is not only gobbling up jobs, but also companies. And this the worst victims in carnage are start-ups. In the last few months many tech start-ups which were viewed as `trailblazers' and `sizzlers' till a year back have either closed down or have been sold for a song.

Lacking enough cash to cushion the deepening economic crisis these young companies have been forced to wind off operations. Here are six `promising' companies that have fallen fatally to the economic turmoil.

Attune Systems

California-based Attune Systems Inc wound up its operations in December as the slowdown pains started hurting the software maker. The 25-member team at Attune Systems developed network file management products aimed to reduce file management complexity for the enterprise, government, and education storage environments.

Attune's flagship product was Maestro File Manager FM5500 NAS virtualisation appliance. The Maestro appliance provides a global namespace, allowing administrators to combine multiple physical volumes into one virtual volume.

The application acceleration and file virtualisation vendor, F5 Networks, recently bought the intellectual property of the now-defunct Attune Systems

Reactrix Systems

Reactrix Systems, a company specialising in interactive projected advertisements in malls and movie theatres, folded despite $75 million in venture backing.

Founded in 2001, Redwood City, California company received $45 million fourth-round of funding in 2006. The company had strategic partnerships with National CineMedia and Samsung.

Experts believe that the company's crash came due to the depressed advertising market caused by the economic downturn. The company apparently lacked enough cash to cushion the blow. Also, some believe that its offerings were considered too futuristic and experimental for clients to gamble their shrinking advertising budgets.

Fuzz.com

Another tech start-up that fell to slowdown is online music start-up Fuzz.com.

In its farewell message to its registered users, the company wrote, "Sadly, we are contacting you to announce that Fuzz.com is shutting down on February 13, 2009. We have decided to shutdown because of increasing operating costs and flat revenues. It simply no longer makes sense for us to keep Fuzz.com running. Please note that once the site is shut down on February 13, 2009, the band and user accounts, and all other content on Fuzz.com, will no longer be accessible."

Founder and chief executive of San Francisco-based music start-up, Jeff Yasuda said "We couldn't drive enough visitor traffic on the site to make it a viable business."

It is being widely speculated that the company has decided to shut down in wake of dedicating their entire funds and resources to Blip.fm, a music station.

VuBotics

Tech startup VuBotics Inc filed for Chapter 11 bankruptcy protection after being in business for three years. The Atlanta-based software company marketed products to improve reading speed and comprehension on digital handheld devices.

According to media reports, VuBotics raised $2.3 million in a stock sale in August 2006 and about $2 million additional in angel capital in 2007. VuBotics had issued 56 million shares to 500 shareholders, according to its Chapter 11 filing.

In the month of October, VuBotics hired Jules Stine, a corporate reorganization expert as its new director and chief operating officer.

TZero Technologies

Another tech start-up that fell victim to the economic downturn was TZero Technologies, a Ultra-wideband (UWB) start-up. Less than a year after raising $18 million from OVP Venture Partners and others, TZero Technologies recently announced it is closing down.

The company joins a shakeout in UWB that has claimed WiQuest and Focus Enhancements. Founded in 2003, TZero's ultra wideband chips are used in HD video audio/video components.

What led to the possible shake-up of UWB is the high cost of UWB chips which never gained a foothold in the consumer market. Also, established technologies such as Wi-Fi, and new ones such as WirelessHD posed a great threat.

Also, UWB started with much fanfare as a way to get rid of wires between consumer devices and an easy way to move high-definition video around the home. However, the promised high-speed data transfer fell short of expectations.
Guava Technologies
Guava Technologies Inc is among the startups that sold themselves up for sums which experts term less than what their investors may have spent on them.

Millipore Corp acquired Guava Technologies, a developer of cell-analysis systems, for $22.6 million. California-based Guava made roughly $22 million in revenue last year.
(Courtesy: www.infotech.itimes.com)
Reblog this post [with Zemanta]

Thursday, February 5, 2009

Google Latitude lets you track friends,kids



A new service on Google Maps, called Latitude, allows cellphone users to check their own location, as well as track their friends' whereabouts. The software, which can also be installed on a laptop or PC, plots a user's location - marked by a personal picture on the map - by relaying on cellphone towers, GPS or a Wi-Fi connection. As for privacy concerns, Latitude - functional in India lets the user decide who can monitor his location, and in how much detail.
Reblog this post [with Zemanta]