By Maggie Shiels
Technology reporter, BBC News, Silicon Valley
t's nearly 40 years old but one leading research company says the days of the computer mouse are numbered.
A Gartner analyst predicts the demise of the computer mouse in the next three to five years.
Taking over will be so called gestural computer mechanisms like touch screens and facial recognition devices.
"The mouse works fine in the desktop environment but for home entertainment or working on a notebook it's over," declared analyst Steve Prentice.
He told BBC News that his prediction is driven by the efforts of consumer electronics firm which are making products with new interactive interfaces inspired by the world of gaming .
For more on this article, please click on the following link: Say goodbye to the computer mouse: BBC
Saturday, July 19, 2008
Say goodbye to the computer mouse: BBC
Friday, July 18, 2008
Look for the silver lining: Economist
Jul 17th 2008
From The Economist print edition
Illustration by Claudio Munoz
Piracy is a bad thing. But sometimes companies can turn it to their advantage
"MERCHANT and pirate were for a long period one and the same person," wrote Friedrich Nietzsche. "Even today mercantile morality is really nothing but a refinement of piratical morality." Companies, of course, would strongly disagree with this suggestion. Piracy is generally bad for business. It can undermine sales of legitimate products, deprive a company of its valuable intellectual property and tarnish its brand. Commercial piracy may not be as horrific as the seaborne version off the Horn of Africa (see article). But stealing other people's R&D, artistic endeavour or even journalism is still theft.
That principle is worth defending. Yet companies have to deal with the real world—and, despite the best efforts of recorded-music companies, luxury-goods firms and software-industry associations, piracy has proved very hard to stop. Given that a certain amount of stealing is going to happen anyway, some companies are turning it to their advantage.
For more on this article, please click on the following link: Look for the silver lining: Economist
Review: iPhone 3G lives up to the hype: CNN
By Kent German and Donald Bell
Decrease font Decrease font
Enlarge font Enlarge font
CNET.com
(CNET) -- Just over a year after Apple birthed the first iPhone, the long-awaited, next-generation iPhone 3G has arrived bearing a mildly tweaked design and a load of new features.
With access to a faster 3G wireless network, Microsoft Exchange server e-mail, and support for a staggering array of third-party software from the iPhone App Store, the new handset is the iPhone we've been waiting for.
It still lacks some basic features but when compared with what the original model was year ago, this device sets a new benchmark for the cell phone world.
With the iPhone 3G, Apple appears to have fixed some call-quality performance issues we had with the previous model--in our initial tests, the volume is louder with less background buzz than before. Music and video quality were largely unchanged, but we didn't have many complaints in that department to begin with.
We're worried about battery life--some early reviews indicate that the iPhone 3G lasts only a day--but we'll run full tests over the next couple of days and report our results on this page.
Price may well remain our largest concern. New AT&T customers and most current AT&T customers can buy the iPhone 3G for $199 for the 8GB model and $299 for the 16GB model. If you don't qualify for that price--check your AT&T account to find out--you'll pay $399 and $499 respectively.
For more on this article, please click on the following link: Review: iPhone 3G lives up to the hype: CNN
Thursday, July 17, 2008
Enigma variations: Economist
Kobal
Jul 10th 2008
From The Economist print edition
A device that counts photons will secure optical data networks from prying eyes
REMOVE the outer coating from a strand of optical fibre, bend it and attach a sensor to detect the tiny amount of light that will leak out. Hacking into an optical network like this is the modern equivalent of a wire tap. But now a laboratory in Cambridge, England, has found a way to turn a hacker's screen instantly blank if he infiltrates the network. This is because the data are being encrypted in a new and probably unbreakable way with one of the first practical devices to be developed for quantum information technology.
The idea of using the more arcane aspects of quantum theory to do things that standard information technology cannot manage has been around for a while. One branch of the field is quantum computing. This, if it can be made to work routinely, promises machines that can do lots of calculations in parallel instead of one at a time, and thus solve problems existing computers cannot manage. The other branch is quantum cryptography, which promises unbreakable codes for messages.
For more on this article, please click on the following link: Enigma variations: Economist
Tuesday, July 15, 2008
Mobile web reaches critical mass: BBC
The mobile web has reached a "critical mass" of users this year, according to a report by analysts Nielsen Mobile.
The US is the most tech savvy nation with nearly 40 million Americans - 16% of all US mobile users - using their handset to browse on the move.
The UK and then Italy come a close second and third in the 16 countries surveyed by the analyst firm.
Indonesia has the lowest take-up with just 1.1% of mobile subscribers using their handsets for surfing the web.
The firm believes the growth of the mobile web is a combination of increasing numbers of user friendly handsets, higher speed networks and unlimited data packages.
"The adoption and the experience are improving at an impressive rate," said Nic Covey, Nielsen Mobile's director of insights.
For more on this article, please click on the following link: Mobile web reaches critical mass: BBC
Tuesday, July 8, 2008
Google must divulge YouTube log: BBC
Google must divulge the viewing habits of every user who has ever watched any video on YouTube, a US court has ruled.
The ruling comes as part of Google's legal battle with Viacom over allegations of copyright infringement.
Digital rights group the Electronic Frontier Foundation (EFF) called the ruling a "set-back to privacy rights".
The viewing log, which will be handed to Viacom, contains the log-in ID of users, the computer IP address (online identifier) and video clip details.
While the legal battle between the two firms is being contested in the US, it is thought the ruling will apply to YouTube users and their viewing habits everywhere.
For more on this article, please click on the following link: Google must divulge YouTube log: BBC
Free speech is thorny online: CNN
NEW YORK (AP) -- Rant all you want in a public park. A police officer generally won't eject you for your remarks alone, however unpopular or provocative.
Say it on the Internet, and you'll find that free speech and other constitutional rights are anything but guaranteed.
Companies in charge of seemingly public spaces online wipe out content that's controversial but otherwise legal. Service providers write their own rules for users worldwide and set foreign policy when they cooperate with regimes like China. They serve as prosecutor, judge and jury in handling disputes behind closed doors.
The governmental role that companies play online is taking on greater importance as their services -- from online hangouts to virtual repositories of photos and video -- become more central to public discourse around the world. It's a fallout of the Internet's market-driven growth, but possible remedies, including government regulation, can be worse than the symptoms.
Dutch photographer Maarten Dors met the limits of free speech at Yahoo Inc.'s photo-sharing service, Flickr, when he posted an image of an early-adolescent boy with disheveled hair and a ragged T-shirt, staring blankly with a lit cigarette in his mouth.
For more on this article, please click on the following link: Free speech is thorny online: CNN
Sunday, July 6, 2008
Asian invasion: Video Games: Economist
Jun 26th 2008
From The Economist print edition
A new business model: give away the game and charge avid players for extras
FOR millions of East Asians, online gaming is not so much a hobby as a way of life. "Massively multiplayer" online games such as "Legend of Mir 3" and "MapleStory" have legions of devoted fans who spend an alarming proportion of their waking hours sitting in front of their PCs, at home or in internet cafés, doing battle with elves, wizards and mythological beasts. Some players take their parallel gaming lives very seriously: one man murdered a friend in a dispute over a stolen virtual sword.
Many of these games rely on a business model that is different from the way the video-games industry works in the West. Rather than selling games as shrink-wrapped retail products which can then be played on a PC or games console, the Asian industry often gives away the software as a free download and lets users play for nothing. Revenue comes instead from small payments made by more avid players to buy extras for their in-game characters, from weapons to haircuts. In this way, a minority of paying customers subsidise the game for everyone else.
For more on this article, please click on the following link: Asian invasion: Video Games: Economist
Thursday, July 3, 2008
Huawei to deploy WiMAX network for Mobilink in Pakistan: Telecom Paper
Chinese telecommunications firm Huawei Technologies has been selected by Pakistani mobile operator Mobilink to deploy a commercial WiMAX 16e network. The network will cover central business districts and hot spots in Pakistan's six major cities of Islamabad, Karachi, Sialkot, Faisalabad, Lahore and Rawalpindi. Under the terms of the contract, Huawei will provide Mobilink with a WiMAX system including distributed base stations, an access service network-gateway and a network management system.
For more on this article, please click on the following link: Huawei to deploy WiMAX network for Mobilink in Pakistan: Telecom Paper