Skip to main content

Home/ Open Intelligence / Web 3X (Social + Mobile)/ Group items tagged computing

Rss Feed Group items tagged

Dan R.D.

Crowdsourcing nutrition in a snap - Harvard School of Engineering and Applied Sciences ... - 0 views

  • If keeping a food diary seems like too much effort, despair not: computer scientists at the Harvard School of Engineering and Applied Sciences (SEAS) have devised a tool that lets you snap a photo of your meal and let the crowd do the rest.
  • PlateMate's calorie estimates have proved, in tests, to be just as accurate as those of trained nutritionists, and more accurate than the user's own logs. The research was presented at the 24th ACM Symposium on User Interface Software and Technology, a leading conference on human-computer interaction.
  • “We can take things that used to require experts and do them with crowds,” says Jon Noronha ’11, who co-developed PlateMate as an undergraduate at Harvard and now works at Microsoft. "Estimating the nutritional value of a meal is a fairly complex task, from a computational standpoint, but with a structured workflow and some cultural awareness, we've expanded what crowdsourcing can achieve."
  • ...1 more annotation...
  • "Nutrition is such a pervasive issue in our society, from counting calories at the dinner table to burning them on the treadmill," says Hysen, who now works at Google. “People worry about whether they're doing the right thing. It seemed like a really good opportunity for crowdsourcing to make a difference.”
Dan R.D.

Follow-Up: Gerloff Chimes in on YaCy | WebProNews - 0 views

  • YaCy has no web portal like that of traditional search engines, instead it relies on users to download a peer-to-peer software client, which crawls the web from users’ computers, and indexes sites they visit.
  • Instead, each user gets to make these decisions locally. The portal at search.yacy.net is just a limited demonstration. To get the full experience, you have to install YaCy locally (this usually takes no more than a minute). Then your computer will be part of the YaCy network, and you will be able to draw on the whole network for search results.
  • At FSFE, we find YaCy highly interesting because it’s part of a trend to replace centralised systems with distributed ones. We have Diaspora and other distributed social networks as an alternative to Facebook. We have identi.ca and its status.net platform as an alternative to Twitter, which users can install and run on their own servers. YaCy is one of less than a handful (to my knowledge) of distributed search engines.
  • ...1 more annotation...
  • For more information about YaCy, see here.
Dan R.D.

The semiconductor industry: Space invaders | The Economist - 0 views

  • The battle is not just about dividing up territories already occupied; it is also about finding new lands to conquer. Both firms are keen to stake claims on the largely uncolonised and still somewhat notional terrain known as the “internet of things”: the myriad processors in industrial machinery, consumer goods and infrastructure, ever more of which will communicate with each other and with distant computers. Cisco, a giant American maker of networking gear, estimates that by 2015 there may be almost 15 billion internet-connected devices, up from 7.5 billion in 2010. Whereas the market for more phones and other personal computing devices is limited by the number of persons the planet has to offer, things, being more numerous than people, provide a lot more long-term room for growth.
D'coda Dcoda

Smart tag lets you print electronics on plastic [25Jan12] - 0 views

  • When people receive food or pharmaceuticals, the smart tag will display the temperature record. This method will be less expensive and more accurate than placing alarm sensors in shipping containers, ThinFilm said. ThinFilm's technology, which has been under development since the 1990s, is a printable memory device that stores the ones and zeros of digital information by changing the orientation of polymer chains when a voltage is applied. Last year, ThinFilm partnered with Xerox company PARC to combine its ferroelectric memory with PARC's printed transistors. Adding computing logic allows the device to not only read, write, and process data, but also to store more data.
  • The computing and storage are very limited on this sort of device and will work for less than a year but it is low power and, because it's printed on plastic, low cost. Data can be stored many times and is not lost with loss of power. By partnering with companies that have made a battery, display, and sensor for its memory system, ThinFilm has created smart tags which can be used for many different applications, said CEO Davor Sutija.
  • The company sees integrated printable electronics replacing silicon processors and enabling the Internet of things. For example, the company has deals to supply smart tags that add interactivity to toys and games. It has also had discussions with auto companies to use tags to gather data on vehicle brakes and notify drivers when they need service. In 2013 or 2014, the company plans to add a wireless networking module to its smart tag. That will allow everyday objects to communicate with the near-field communications in cell phones, said Sutija.
Marc-Alexandre Gagnon

Researchers Uncover 'Massive Security Flaws' In Amazon Cloud [28Oct11] - 0 views

  • Amazon's cloud services are vulnerable to attack via a "massive security gap" that enables hackers to access user accounts and data, a team of German researchers has revealed.
  • Security researchers from Ruhr-University Bochum (RUB) found that Amazon (NSDQ:AMZN) Web Services was vulnerable to different methods of attack, including signature wrapping and cross site scripting, Those security holes have since been closed.
  • But similar security holes may still be open in other cloud infrastructure offerings, the RUB team found.
  • ...7 more annotations...
  • "Using different kinds of XML signature wrapping attacks, we succeeded in completely taking over the administrative rights of cloud customers," said RUB researcher Juraj Somorovsky in a statement. "This allowed us to create new instances in the victim's cloud, add or delete images."
  • The researchers suggested that many cloud offerings are vulnerable to signature wrapping attacks, due to a deviation between performance and security when dealing with Web services.
  • Along with cross scripting attacks, the researchers uncovered gaps in the AWS interface and in the Amazon online story through which executable script code could be smuggled, or open to cross-site scripting attacks. Through the attack, the RUB security team was able to access customer data.
  • "We had free access to all customer data, including authentication data, tokens, and even plain text passwords," said RUB researcher Mario Heiderich. "It's a chain reaction. A security gap in the complex Amazon shop always also directly causes a gap in the Amazon cloud."
  • Along with Amazon's public cloud offerings, the RUB security crew also found single wrapping attack and cross site scripting vulnerabilities in private cloud services, including open-source cloud play Eucalyptus Systems. Eucalyptus also immediately closed the security gap when notified by RUB researchers.
  • "A major challenge for cloud providers is ensuring the absolute security of the data entrusted to them, which should only be accessible by the clients themselves," said Prof. Dr. Jorg Schwenk.
  • Somorovsky added: "Therefore it is essential that we recognize the security gaps in cloud computing and avoid them on a permanent basis.
Marc-Alexandre Gagnon

EnStratus raises $3.5M for hybrid cloud management - Cloud Computing News [07Nov11] - 0 views

  • Cloud computing startup enStratus has raised $3.5 million in Series A funding to grow its business of managing all types of clouds across a common interface. El Dorado Ventures led the round with participation from Vesbridge Partners.
  • The long and short of enStratus’ technology is that it provides a secure platform for managing and monitoring popular public and private cloud offerings through a single interface. In theory, this means customers can utilize multiple clouds and even switch between cloud providers without having to learn the intricacies of each provider’s APIs or management consoles.
  • The Minneapolis-based EnStratus is similar to the more widely known RightScale service, although enStratus actually supports more clouds. It currently claims support for Amazon Web Services, AT&T Synaptic Storage, Bluelock, Cloud Central, Cloud.com, CloudSigma, EMC Atmos (e emc), Eucalyptus, Google Storage, GoGrid, Nimbula, OpenStack, Rackspace, Terremark, VMware vSphere, VMware vCloud Express and Windows Azure.
  • ...1 more annotation...
  • EnStratus has been on something of a hiring binge lately, including bringing on popular cloud blogger (now GigaOM contributor) and former Cisco cloud strategist James Urquhart as VP of product strategy.
Marc-Alexandre Gagnon

Gartner Identifies the Top 10 Strategic Technologies for 2012 [18Oct11] - 0 views

  • Gartner, Inc. today highlighted the top 10 technologies and trends that will be strategic for most organizations in 2012.
  • Gartner defines a strategic technology as one with the potential for significant impact on the enterprise in the next three years. Factors that denote significant impact include a high potential for disruption to IT or the business, the need for a major dollar investment, or the risk of being late to adopt.
  • A strategic technology may be an existing technology that has matured and/or become suitable for a wider range of uses. It may also be an emerging technology that offers an opportunity for strategic business advantage for early adopters or with potential for significant market disruption in the next five years. These technologies impact the organization's long-term plans, programs and initiatives.
  • ...11 more annotations...
  • The top 10 strategic technologies for 2012 include:
  • Media Tablets and Beyond.
  • Mobile-Centric Applications and Interfaces.
  • Contextual and Social User Experience.
  • Internet of Things.
  • App Stores and Marketplaces.
  • Next-Generation Analytics.
  • Big Data.
  • In-Memory Computing
  • Extreme Low-Energy Servers.
  • Cloud Computing.
Dan R.D.

Heightened Connectivity - US Teens on the Mobile Web [27Apr10] - 0 views

  • The Pew Internet & American Life Project’s “Teens and Mobile Phones” report indicated that black teens were more than twice as likely as whites to go online on their mobile phones, at 44% versus 21%. Hispanic teens were also relatively active on the mobile Web.In addition, teens living in households with annual income under $30,000 used the mobile Internet at almost twice the rate of more affluent groups. They were notably less likely to have access through a home computer. Pew reported that, overall, 21% of teens who had no traditional PC access to the Internet went online via mobile phones.See more at www.emarketer.com
  •  
    The article goes on to describe an untapped market of well-connected urban minded individuals who prefer authentic brands that avoid using athletes and entertainers to market their products.
D'coda Dcoda

Cloud Gaming [5May10] - 0 views

  • Cloud Computing is both an abstract concept which can reffer to every logical grouping of software services provided by one or more companies which may or may not be on the same hardware architectures. ted ar It also stands for the physical architectures involving SOA (services-oriented architecture) systems, server farms and a lot of hardware to provide on demand services 24/24 no matter what may happen. Not matter how one sees it, it’s all about regrouping services and taking responsabilities off from our good old PC or laptop standing on our desk. Not matter how one sees it, it’s all about regrouping services and taking responsabilities off from our good old PC or laptop standing on our desk.  Of course it’s a 2010 buzzword and I am personally seeing some kind of Terminal Server (Mainframes anyone?…) à la sauce New Millenium coupled with web technologies. The thing is… Cloud Computing along with Software Virtualization are really promising.  I put the second one with it because everything is about having almost nothing on the client side. ore.  You just log into the cloud and there you have your account and your services, may they be ga The idea of having every service in the Cloud is to ensure that eveything you need is always available from wherever you are on the planet.  You don’t need your PC or Laptop anymore.  You just log into the cloud and there you have your account and your services, may they be games, movies or any software.  And with the huge Mobile market, you’re about to have any of your services right there in your pocket. Read more at www.gamasutra.com 
D'coda Dcoda

Augmented Reality on the Big Screen [17May11] - 0 views

  • While tablet computing may in future transform the whole computer industry, it is already changing the way we look at augmented reality. And this is not only because of the big display. More and more different devices for multiple OS platforms are expected to appear on the market, equipped with advanced sensors such as high-resolution cameras. The cost of data roaming is likely to drop and considering the millions of people expected to buy such a device in the next few years, there are incentives enough for optimizing augmented reality (AR) tablet software and to start creating really useful and fascinating applications taking full advantage of the promising, new capabilities. metaio, with its junaio 2.6 release, a junaio plug-in for third party app integration, and the revised mobile AR SDK Unifeye 2.5, is well prepared and ready to go for the next generation of AR applications. If you want to learn more about mobile AR in general and on tablets, everything is summed up here: http://www.metaio.com/specials/augmented-reality-on-tablets/ And here you can find a movie with almost everything we´re working on: 3D tracking, markerless 2D tracking and image processing, virtual manuals, interactive TV, smart packaging, advertising as a service, context sensitive product visualization, AR gaming and so on. By the way: to my knowledge it´s the first AR demos running on the Android 3.0 based Xoom!
D'coda Dcoda

Hackers For Egypt Advocate For A Better Democracy Through Technology [27May11] - 0 views

  • Post-revolution Egypt is in a state of flux overlooked by outsiders. New political parties are forming while various factions hustle for power. As Egypt gears up for free elections, tech-savvy geeks are betting that their projects will have a major impact on how people will vote.
  • A combination of academics and entrepreneurs recently worked with Egyptian activists on a “Hackathon for Egypt” that provides some interesting--and fascinating--clues.
  • Participants in the hackathon were organized by Cloud to Street, a project dedicated to aiding Egyptian activists through technology. Cloud to Street is headed up by a loose group of primarily Canadian scholars and diplomats. Approximately 75 programmers took part, as well as Egyptian activists who attended both in person and via teleconference
  • ...3 more annotations...
  • Most of the tech created at the conference was aimed at Egypt's upcoming elections, which civil-society activists have been obsessively monitoring. The upcoming vote is expected to be the first free election for a leader in Egypt's long, long history. Elections are expected to occur in October or November; the ruling military junta has been unclear on the exact date.
  • The conference's most intriguing result was a platform for crowdsourcing the new Egyptian constitution. The platform, which appears to have drawn inspiration from a similar project in Tunisia, allows users to simultaneously browse constitutional texts from multiple countries, propose articles and ideas online and to collaborate on compiling the ideas into a workable text. Owing to Egypt's special circumstances, the platform also contains extensive provisions for off-computer use--many Egyptians simply don't have regular access to either a computer or the Internet.
  • Other projects worked on at the hackathon included a web platform for training Egyptian election monitors and an interactive tool that allows voters to explore the policies of various parliamentary candidates.
Dan R.D.

Google Vies With Microsoft for Runner-Up to Apple's iPad [30May11] - 0 views

  • Computex trade show in Taipei.
  • “Investors want to know which tablet is better, which has the best price-performance, and when the non-iPad camp is going to get going,” said Angela Hsiang, an analyst at KGI Securities Co. in Taipei. “Previously, people couldn’t actually see the products. At Computex, we’ll be able to touch and use them.”
  • Global shipments of tablets will climb to 215 million units in 2015 from 17 million last year, Toni Sacconaghi, a New York- based analyst at Sanford C. Bernstein & Co., wrote in a May 26 report. Fifteen percent of all tablets will cannibalize the sale of consumer PCs, reducing computer-sales growth by 2 percent annually between 2010 and 2015, Sacconaghi wrote.
  • ...3 more annotations...
  • Microsoft’s computer platform, isn’t compatible with ARM chips, which are used in tablets from Samsung Electronics Co. and Motorola Mobility Holdings Inc.
  • “ARM plus Microsoft will be a big development in the future, and if that’s a success then it’ll be big for the market,” said KGI’s Hsiang. “Windows 8 will also impact the market because many people can’t get used to Android while they’re familiar with Windows.”
  • “Most vendors still worry about quality and stability,” Chiang said. “At this moment, they choose Google because its cost is lower as the operating system is free, while Windows adds to the price.”
Dan R.D.

Next Century's Winners Will Master Machine-to-Object Communication, Leading Observer Sa... - 0 views

  • Mark Roberti, founding editor of the publication RFID Journal, writes in an editorial this month that while M2M communication has great potential, the "real value" for sensor technology lies in machine-to-object communication.
  • "On the other hand, a firm could put passive ultrahigh-frequency (UHF) transponders inside a container at various levels. Since the liquid would interfere with the ability to read the tags, a company could determine liquid levels by ascertaining which tags can and can not be read...you can't put a Wi-Fi transmitter or a cell phone on every box of Tide detergent, bag of Granny Smith apples or Van Heusen shirt. Low-cost RFID tags will, one day, be put on all of these things, enabling M2O communication."
  • Leading wireless industry analyst Chetan Sharma detailed a similar vision to us in an interview earlier this year. (How 50 Billion Connected Devices Could Transform Brand Marketing & Everyday Life.) Sharma talked with us about cereal boxes with sensors inside them.
  • ...2 more annotations...
  • Roberti says this will be a defining opportunity for the rest of the century. "This change - enabling computers to see and understand what is happening in the real world - is enormous. Most people have yet to grasp it, seeing RFID as a more expensive alternative to bar codes. They don't comprehend that when computers can automatically collect information regarding what is happening in the world, new insights and business strategies then become possible. And the companies that leverage these capabilities most effectively will be the big winners in the century ahead."
  • Such a vision raises questions of consumer privacy, data ownership, silos vs. effective cross-company development platforms, corporate vs. consumer power and much more.
D'coda Dcoda

The Desktop Is Turning Mobile [09May11] - 0 views

  • many ways mobile technologies are derivative of their desktop brethren. Your iPhone's e-mail app is like the e-mail client on your desktop, for example. The mobile world is the desktop world in miniature, a "lite" version. But the mobile world is no longer just following; it's leading.
  • we can expect to see certain aspects of desktop and laptop operating systems start imitating the little upstarts that had initially imitated them.
  • "It's very likely that PC operating systems will be affected by mobile devices' operating systems—and more broadly, that the lines between the two will increasingly blur," says Michael Dahlin, a professor of computer science at the University of Texas, who has expertise in operating systems. "Things have evolved to the point today where the difference between the smart-phone OS and the laptop and desktop OS is narrowing—and really already pretty narrow in terms of capability and core architectures," he
  • ...2 more annotations...
  • another factor is speeding it along: the cloud. "The cloud is part of what's going to enable and probably drive convergence between phone and mobile operating systems and desktop operating systems,
  • What features associated with mobile might migrate back to desktops and laptops? Some are long rumored to be on the way in devices from Apple and other manufacturers: touch screens, gesture-based interfaces, more speech recognition, and so on.
Dan R.D.

Africa's mobile economic revolution [24Jul11] - 0 views

  • It may seem unlikely, given its track record in technological development, but Africa is at the centre of a mobile revolution. In the west, we have been adapting mobile phones to be more like our computers: the smartphone could be described as a PC for your pocket. In Africa, where a billion people use only 4% of the world's electricity, many cannot afford to charge a computer, let alone buy one. This has led phone users and developers to be more resourceful, and African mobiles are being used to do things that the developed world is only now beginning to pick up on.
  • The mobile banking phenomenon spread quickly to other countries in the developing world. Uganda's largest telecom company, MTN Uganda, created its own version, MobileMoney, in March 2009. Within a year, 600,000 Ugandans had signed up. Now, thanks to aggressive recruitment drives to win more subscribers – MTN agents trolling the streets for new customers are known as "foot soldiers" – the service has more than 1.6 million users.
  • Mobile phones carry huge economic potential in undeveloped parts of Africa. A 2005 London Business School study found that for every additional 10 mobile phones per 100 people in a developing country, GDP rises by 0.5%. As well as enabling communication and the movement of money, mobile networks can also be used to spread vital information about farming and healthcare to isolated rural areas vulnerable to the effects of drought and disease.
Jan Wyllie

'Cancer risk for mobile phones' | This is Devon - 0 views

  • Earlier this year, the World Health Organisation (WHO) classified radiation emitted by mobile phones as a possible cancer risk, with a similar threat to lead and the banned pesticide DDT. And the European Commission also issued a warning saying that individuals should be protected from low-frequency radiation emitted by cell phones, masts and Wi-Fi systems.
  • Mr Stein, the chief group executive of Samworth Brothers
  • began suffering the effects of low-frequency radiation six years ago when he experienced pain when using his mobile phone. “I began getting weird sensations in my ear if I went near a computer or TV, any electrical equipment with a microchip” he said. “I took the view that I was a freak and kept quiet, but it was difficult because I couldn’t drive a modern car with computers on board.” Mr Stein’s research eventually led him to the diagnosis that he is electro-sensitive, a condition he shares with several thousand people in the UK. Electro sensitivity is caused by the thousands of magnetic fields that surround us, from mobile and cordless phones to other wireless devices, including car sat-nav kits. The symptoms include sleep problems, headaches, tinnitus and earache, chest pains, loss of memory, poor concentration and depression.
  • ...3 more annotations...
  • In May the European Parliamentary Assembly issued a report which recommended the use of Wi-Fi be restricted in public places and schools.
  • An HPA spokesman said there was “no clear scientific evidence” of a cancer risk at levels below international guidelines, but admitted that “the possibility remains”. “Given the possibility of long-term cancer effects, excessive use of mobile phones by children should be discouraged,” the spokesman added.
  • Exposures from Wi-Fi are much less than from mobile phones,
Dan R.D.

How This Guy Is Making Your iPhone Virtually Human [17Sep11] - 0 views

  • Today, your iPhone is a gadget, a mere consumer appliance. But your future iPhone will become increasingly human. You’ll have conversations with it. The phone will make decisions, prioritize the information it presents to you, and take action on your behalf — rescheduling meetings, buying movie tickets, making reservations and much more.
  • In short, your iPhone is evolving into a personal assistant that thinks, learns and acts. And it’s all happening sooner than you think,
  • Ultimately, however, human beings are hard-wired to communicate with other people, not computers. And that’s why the direction of interface design is always heading for the creation of artificial humans.
  • ...6 more annotations...
  • For speech, Apple has maintained a long-standing partnership with the leading company. A version of iOS 5 with Nuance Dictation has reportedly been sent out to carriers for testing.
  • There are four elements to a machine that can function like a person: 1) speech; 2) decision-making algorithms; 3) data; and 4) “agency,” the ability to act in the world on your behalf.
  • For decision-making algorithms, Apple can rely on the amazing technology it purchased in April, 2010, when it bought Siri, a company that created a personal-assistant application that you talk to, and it figures out what you want.
  • The most expensive, ambitious and far-reaching attempt to create a virtual human assistant was initiated in 2003 by the Pentagon’s research arm, DARPA (the organization that brought us the Internet, GPS and other deadly weapons).
  • The project was called CALO, for “Cognitive Assistant that Learns and Organizes,” and involved some 300 of the world’s top researchers.
  • The man in charge of the whole project was a brilliant polymath who worked as senior scientist and co-director of the Computer Human Interaction Center at SRI, Adam Cheyer (pictured above).
Dan R.D.

Augmented Reality: past, present and future [03Jul11] - 0 views

  • For example, way back in 1961, cinematographer Morton Heilig patented his Sensorama machine, an immersive multi-sensory device that looked like a giant arcade game, except it emitted aromas, environmental elements such as wind and it also vibrated and played stereo sounds. Whilst some have referred to this as the earliest example of augmented reality, it probably leans more towards the virtual reality world.
  • Other key advances that helped blur the boundaries between the physical and digital worlds include American Computer scientist Ivan Sutherland’s development of the first head-mounted display (HMD) in 1968. It was primitive and bulky, but it was a sign of things to come:
  • Moving forward, computer artist Myron Krueger built what was called an ‘artificial reality’ laboratory called the Videoplace, in 1974. The Videoplace combined projectors, video cameras and special purpose hardware, and onscreen silhouettes of the users, placing them within an interactive environment.
  • ...2 more annotations...
  • Whilst augmented reality as a concept had been brewing for some time, it was Professor Thoma P. Caudell, then a researcher at Boeing, who first coined the term ‘augmented reality’ in 1990. He was referring to a head-mounted digital display that guided workers through assembling electrical wires in aircrafts.
  • AR as a concept started to take off during the 90s, and the development of virtual fixtures in 1992 is widely considered as one of the first properly functioning AR systems.
Dan R.D.

Smart Phones Could Hear Your Password [18Oct11] - 0 views

  • The sensors inside modern smart phones present a range of security threats. An attacker who compromises a phone can, for example, track the owner's location by GPS, use the camera to see the phone's surroundings, or turn on its microphone to record conversations. At a conference in Chicago on Thursday, a group of computer researchers from Georgia Tech will report on another potential threat. The researchers have shown that the accelerometer and orientation sensor of a phone resting on a surface can be used to eavesdrop as a password is entered using a keyboard on the same surface. They were able to capture the words typed on the keyboard with as much as 80 percent accuracy.
Dan R.D.

You say you want a revolution? It's called post-PC computing [24Oct11] - 0 views

  • How could Google, the high priest of the cloud and the parent of Android, analytics and AdWords/AdSense, not be a standard-setter for platform creation?
  • Amazon's strategy seems to be to embrace "open" Android and use it to make a platform that's proprietary to Amazon, that's a heck of a story to watch unfold in the months ahead. Even more so, knowing that Amazon has serious platform mojo.
  • Case in point, what company other than Apple could have executed something even remotely as rich and well-integrated as the simultaneous release of iOS 5, iCloud and iPhone 4S, the latter of which sold four million units in its first weekend of availability?
  • ...8 more annotations...
  • Let me answer that for you: No one.
  • The downside of this is that because the premise of the web is about abstracting out hardware and OS specificity, browsers are prone to crashing, slowdowns and sub-optimal performance. Very little about the web screams out "great design" or "magical user experience."
  • Given its multiplicity of capabilities, it's not hard to imagine a future where post-PC devices dot every nook and cranny of the planet (an estimated 10 billion devices by 2020, according to Morgan Stanley).
  • In the PC era, for example, the core problems were centered on creating homogeneity to get to scale and to give developers a singular platform to program around, something that the Wintel hardware-software duopoly addressed with bull's-eye accuracy. As a result, Microsoft and Intel captured the lion's share of the industry's profits.
  • The mainframe was dwarfed by the PC, which in turn has been subordinated by the web. But now, a new kind of device is taking over. It's mobile, lightweight, simple to use, connected, has a long battery life and is a digital machine for running native apps, web browsing, playing all kinds of media, enabling game playing, taking photos and communicating.
  • Now, Apple is opening a second formal interface into iOS through Siri, a voice-based helper system that is enmeshed in the land of artificial intelligence and automated agents. This was noted by Daring Fireball's John Gruber in an excellent analysis of the iPhone 4S: ... Siri is indicative of an AI-focused ambition that Apple hasn't shown since before Steve Jobs returned to the company. Prior to Siri, iOS struck me being designed to make it easy for us to do things. Siri is designed to do things for us.
  • stock performance of Apple, Amazon and Google after each company's strategic foray into post-PC computing: namely, iPod, Kindle and Android, respectively.
  • This is one of those cases where the numbers may surprise, but they don't lie.
‹ Previous 21 - 40 of 113 Next › Last »
Showing 20 items per page