Three tech predictions for 2013

January 2, 2013

tech_prediction

Sometimes the most important ideas in tech are hiding in plain sight. In that spirit, here are three predictions for 2013 that are just waiting to happen. No 3D TVs, wearable computer or jet packs for me — at least not this year.

The Kindle Offer You Can"t Refuse

Demand is rapidly shrinking for e-ink e-book readers. IHS iSuppli predicts that when the books close on 2012 some 15 million will have been sold — down 36 percent from 2011.

And why not? Tablets are getting cheaper. Sure, you can pick up an ad-supported Kindle for as little as $70. But why shell out even that when $200 gets you an e-reader, and a media player, and a gaming machine, and everything else?

Dedicated e-ink readers aren"t falling out of favor because the technology has been surpassed. They"re losing out because the value proposition has changed. There"s a simple solution. Make them inexpensive enough so that it becomes an offer you can"t refuse.

That will happen at $50. At that price, buying a niche item you might use only occasionally is a relatively easy decision. It would be a no-brainer for students. A stocking stuffer for pre-teens that might even tear them away from their gaming consoles. An afterthought.

Nobody but Jeff Bezos & Co. know what Amazon needs to make (or, more likely, can afford to lose) on even a bare-bones Kindle, though it is generally accepted wisdom that the Kindle line has value to the company as a loss leader for the sale of books — razors to blades, as it were. Amazon also has a history of pushing price barriers: it experimented with universally-priced $10 e-books — selling them below cost, to the consternation of publishers.

Amazon started the digital book revolution. E-ink technology was life-altering, and remains far too worthy to disappear. The only thing “wrong” with it is that it"s too expensive. Amazon is uniquely positioned to fix that and breathe new life into this still-revolutionary device.

The Netbook Strikes Back

E-readers managed to survive a metaphysical threat from tablets. Netbooks, not so much.

Netbooks — bare-bones, inexpensive, portable computers — were poised to change the world. But just as they burst on the scene, full-powered computers got just as small and just as light, like Apple"s MacBook Air. And then the iPad sucked out whatever air was left in the room.

Conditions have conspired again to make netbooks attractive. Advances in cloud computing make productivity activities — collaborating on and sharing documents — painless. That in turn makes hard drives — local storage — less important. Indeed, lighter flash drives with less capacity than hard drives are now de rigueur on high-end devices. And the biggest compromise of the netbook — the lack of a CD drive — is now increasingly irrelevant.

So who actually needs to pay for lots of bells and whistles?

Many of us do, of course. But many of us don"t. If you can spend $200 or so for a serviceable laptop you might think twice about “needing” something that costs $1,000 more.

Computing has been Balkanized by the mobile revolution. We work on our phones at least as much as on our laptops. We only discovered a need for tablets three years ago and now they dominate. Laptops are still essential for long periods of typing. But these days they are just another tool in the chest, a computer you resort to rather than seek out first.

Netbooks will become attractive again because the cult of the machine is shifting to big remote servers that allow us to use thinner, less expensive clients. And it is the upstarts in this space that have the most to gain — notably Google.

The search giant may be uniquely positioned to innovate because it has the resources and wherewithal to enter a commodity business with razor-thin margins. Google started pushing netbooks a couple of years ago and last year unveiled leasing plans for businesses and schools. It"s expanding now with direct-to-consumer sales of two models, the most expensive of which is a $250 machine built with Samsung — right in the sweet spot of tablet pricing and a fraction of the cost of comparable ultralights.

There is one big problem: given that these devices arrived with a thud the first time, the word “netbook” itself may have negative connotations — Google doesn"t use it at all, calling their netbooks “Chromebooks.”

So, let the makeover begin.

Take a letter, Siri!

Siri started a quiet revolution when it was introduced with the iPhone 4S in 2011. Like many Apple innovations, voice command was not something new — it was old and mostly reviled. Voice control never seemed to work well — and seemed curiously inappropriate — on desktop computers. And with Siri, sometimes it feels like she is from Venus and we are from Mars.

But, unlike with desktops, we naturally speak into our phones. So speaking to our phones to control our phones doesn"t seem odd at all. Full disclosure: I was hooked on Siri from the start, warts and all. Last year at about this time I described Siri as one of the previous year"s ''tech earthquakes.''

Siri wasn"t exactly the everyman's Watson, but my romance has not waned. There have, however, been some prominent divorces: The New York Times' Nick Bilton wrote a mournful Dear Siri letter in July, confessing that “last week I had what will probably be my last conversation with Siri for a while.”

But stick with me on this. Siri, and its Android equivalents, will catch fire in 2013.

The weakest link with a computer is always input — how we communicate with it. Keyboards, trackpads and gaming controllers are imperfect proxies. We are always looking for shortcuts to operate the computer as fast as we can think.

Much of the iPhone"s success is because it is so easy to operate — the interface keeps up with us like never before. I sketched out this column while running chores. There would have been no other way for me to capture snippets of ideas on the run without the ability to dictate and have my phone transcribe. And we all know we get our best ideas at the worst time: dashing to an appointment; running on the treadmill; sitting in traffic; in the middle of the night when lying in bed.

Siri"s acceptance has been slower than I expected — most iPhone users I know don"t use it (or admit to it). But voice control is everywhere now. Google"s Android-powered devices are, by some accounts, a match for Apple's tech. Siri and Android voice control both now open apps, making the switch among them even less complicated.

So here is what"s going to happen next year: There will be greater awareness of voice tech"s ability to take near-perfect dictation — maybe the least sexy feature, but the most useful in our daily lives. Siri and her cousins will gain wide acceptance for the simplest things they do, as improvements to the more complicated tasks gradually improve.

Google and Apple would be wise to nudge this along with marketing campaigns that emphasize not the Holy Grail 'semantic search' but the seemingly humble ability of mobile devices to do what they are told. It"s a big deal that they"re at our beck and call.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 7,2020

Toronto, May 7: Scientists have uncovered how bats can carry the MERS coronavirus without getting sick, shedding light on what triggers coronaviruses, including the one behind the COVID-19 pandemic, to jump to humans.

According to the study, published in the journal Scientific Reports, coronaviruses like the Middle East respiratory syndrome (MERS) virus, and the COVID19-causing SARS-CoV-2 virus, are thought to have originated in bats.

While these viruses can cause serious, and often fatal disease in people, bats seem unharmed, the researchers, including those from the University of Saskatchewan (USask) in Canada, said.

"The bats don't get rid of the virus and yet don't get sick. We wanted to understand why the MERS virus doesn't shut down the bat immune responses as it does in humans," said USask microbiologist Vikram Misra.

In the study, the scientists demonstrated that cells from an insect-eating brown bat can be persistently infected with MERS coronavirus for months, due to important adaptations from both the bat and the virus working together.

"Instead of killing bat cells as the virus does with human cells, the MERS coronavirus enters a long-term relationship with the host, maintained by the bat's unique 'super' immune system," said Misra, one of the study's co-authors.

"SARS-CoV-2 is thought to operate in the same way," he added.

Stresses on bats, such as wet markets, other diseases, and habitat loss, may have a role in coronavirus spilling over to other species, the study noted.

"When a bat experiences stress to their immune system, it disrupts this immune system-virus balance and allows the virus to multiply," Misra said.

The scientists, involved in the study, had earlier developed a potential treatment for MERS-CoV, and are currently working towards a vaccine against COVID-19.

While camels are the known intermediate hosts of MERS-CoV, they said bats are suspected to be the ancestral host.

There is no vaccine for either SARS-CoV-2 or MERS, the researchers noted.

Follow latest updates on the COVID-19 pandemic here

"We see that the MERS coronavirus can very quickly adapt itself to a particular niche, and although we do not completely understand what is going on, this demonstrates how coronaviruses are able to jump from species to species so effortlessly," said USask scientist Darryl Falzarano, who co-led the study.

According to Misra, coronaviruses rapidly adapt to the species they infect, but little is known on the molecular interactions of these viruses with their natural bat hosts.

An earlier study had shown that bat coronaviruses can persist in their natural bat host for at least four months of hibernation.

When exposed to the MERS virus, the researchers said, bat cells adapt, not by producing inflammation-causing proteins that are hallmarks of getting sick, but instead by maintaining a natural antiviral response.

On the contrary, they said this function shuts down in other species, including humans.

The MERS virus, the researchers said, also adapts to the bat host cells by very rapidly mutating one specific gene.

These adaptations, according to the study, result in the virus remaining long-term in the bat, but being rendered harmless until something like a disease, or other stressors, upsets this balance.

In future experiments, the scientists hope to understand how the bat-borne MERS virus adapts to infection and replication in human cells.

"This information may be critical for predicting the next bat virus that will cause a pandemic," Misra said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 22,2020

New Delhi, Jan 22: "Don't get into a trap. Your security is in your hands," the Border Security Force (BSF) has said issuing its social media rules for its officers and men. It has directed them not to use 42 mobile applications and show caution while using Facebook, Twitter and WhatsApp.

"Be cautious while using social media," said the BSF in a circular issued recently.

"Before using WhatsApp, Facebook, Twitter and other social media platforms, one needs to keep in mind that you are border guarding force and Central Civil Services (Conduct) Rules rule duly are applicable," it said.

It further pointed out that by commenting/writing about or forwarding unverified reports and rumours one violates laws of land.

"Several times unverified reports would be presented in way that they are absolutely true and start believing it. Seeing such post always use your commonsense and never get into the trap (sic.)," it state adding that the anti-national elements uses social media to propagate their agenda to cause unrest in India.

A picture clicked by Border Security Force personnel and posted on a social media platform remains there for always. Therefore, one should use officially approved pictures about any incident or untoward incidents related to Border Security Force, stated the circular. It pointed that unauthorised persons should not engage into taking pictures of the incidents.

It also highlighted how through social media, a few BSF personnel have fallen into trap of espionage racket carried out by enemy countries.

"Our security and respect is in our hands. Always think twice whether you are doing correct by accepting friendship requests from unknown persons, especially women and girls," it cautioned the troopers and officers.

It also highlighted that while going on leave and joining back the force, always follow the rules and regulations laid out for safety and security. "This is for your own safety," it stressed in the end.

The BSF has also issued a list of 42 mobile applications that needs to be completely avoided by serving BSF officers and jawans.

They are MI store, Weibo, Wechat, Shareit, Truecaller, UC News, UC Browser, Beautyplus, NewsDog, Viva Video - QU video Inc, Parallel Space, Apus Browser, Perfect Corp, Virus Cleaner - HI Security Lab, CM browser, MI Community, DU recorder, Vault Hide - No mobile Security, Youcam Makeup, Cachecleaner DU Apps Studio, DU battery saver, DU privacy, 360 security, DU Browser,Clean master - Cheeta Mobile, Baidu Translate, Wonder Camera - Bindu Inc, ES Ifle Explorer, Photo Wonder, QQ international , QQ music, QQ Mail, AA player, QQ News Feed, Wesync, QQ security Center, Selfie City, Mail Master, Mi Video Call -Xaomi and QQ launcher.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 15,2020

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing emails in the guise of content coming from the Centers for Disease Control and Prevention (CDC) in the US and World Health Organisation (WHO), says cybersecurity firm Kaspersky.

In the APAC region, Kaspersky has detected 93 coronavirus-related malware in Bangladesh, 53 in the Philippines, 40 in China, 23 in Vietnam, 22 in India and 20 in Malaysia. 

Single-digit detections were monitored in Singapore, Japan, Indonesia, Hong Kong, Myanmar, and Thailand. 

Along with the consistent increase of 2019 coronavirus cases comes the incessant techniques cybercriminals are using to prey on public panic amidst the global epidemic, the company said in a statement. 

Kaspersky also detected emails offering products such as masks, and then the topic became more commonly used in Nigerian spam emails. Researchers also found scam emails with phishing links and malicious attachments.

One of the latest spam campaigns mimics the World Health Organisation (WHO), showing how cybercriminals recognise and are capitalising on the important role WHO has in providing trustworthy information about the coronavirus.

"We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution. 

"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home," commented David Emm, principal security researcher.

Some malicious files are spread via email. 

For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organisation (WHO) was, in fact, a Trojan-Downloader, which secretly downloads and installs another malicious file. 

This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.