Monday, September 15, 2008

Final Project Innovation Prediction Stage 2

Final Project Innovation Prediction Stage 2

The convergence of the Laptop and the Cell Phone

Introduction

The availability of information and the quest to understand the evolution of technology and its use can be seen as some of the drivers that experts and others use to gauge where the future of technology will be in the years ahead. To the layman this is called a prediction. Several other terminologies that are used to understand the evolution of technology relative to predictions. Determinism, forecasts, theories and others are some of the popular terminologies that are used to describe the intricacies of predictions (Sherden, 1998).

Nonetheless, the desire to know more and to compete in the current global economy fans the flames of predictions (Sherden, 1998). While experts and others make predictions on a daily basis, they do not always come through, nor do they all fail (Leigh & Wolfers, 2007). Although it is sometimes difficult to understand the true rational that drives one to predict, predictions are made daily and will continue to be made (Sherden, 1998).


Synopsis of the Computing Evolution

The history of modern computers might be traceable to the inception and gains from the strides (advancement) made from LEDs, programming, operating systems, applications, circuit and circuit boards, transistors, storage devices, input and output devices, memory and other components (Bellis, n.d). Undoubtedly, the demands for micro and mini computers have helped to pave the way for new generations of computing devices.

Laptops, and other handheld devices have benefited from the evolution of larger computing devices. In addition, the advent of wireless handheld devices provides instant communications with other systems, have become popular. Thus, it not uncommon to see a telecommuter, or a student with a laptop connected to a wireless handheld device to access the Internet. Usually these connections are either done with a cord, a PCMCIA or a USB card attached to the laptop. Figure 1. Shows the un-converged devices used to make calls using a cell phone


Nonetheless, the speed and convenience that users obtain from these connections are impressive. Moreover, the user usually sacrifices the use of their cell phone to go online. Thus, the cell phone will not available for accepting or placing calls while it is connected to the laptop. The ubiquity of laptops has come a long way. They have gotten smaller, faster, lighter, cheaper and vendors are constantly pushing the envelope to launch new and exciting products to enhance the user experience. In the recent past, we have seen laptops that come with Wireless Local Area Networks (WLAN) cards and Worldwide Interoperability for Microwave Access (WIMAX) technology is lurking the horizons. Figure 2. Shows the projected growth for wireless communications.



Prediction

While cell phones can be used via a specialized cord to enable the same functionalities as modems to facilitate broadband connectivity, the author predicts that the new frontier of convergence will foster laptops that have a built-in docking station for cell phones. The cell phone will sit on (in) a docking interface on the laptop. It will allow the cell phone to charge, accept calls and enable broadband connectivity wirelessly to the laptop simultaneously. Fourth-generation (4G) wireless communications may be required to make sure that end-to-end connectivity receives the quality of service (QoS) necessary to enhance the end-user experience. Third Generation (3G) wireless technologies are here but they are not mature. 4G is expected to enable enhance use of the existing 3G technologies such as WiMAX and WiFi.



For instance, while the phone is docked on (in) the laptop, a few mouse clicks can be made to specialized software on the laptop to engage the phone to connect to the Internet. Through multiplexing, compression and other 3G/4G technologies, the broadband capabilities will enable calls to be received via the blue tooth port on the phone, laptop or the speakers (speakerphone) on the laptop. This capability (convergence) can also enable video conferencing for telemedicine (Halal, 2008).




With new and emerging technologies going to market on a daily basis, products that are untested along with poor design practices can impede the adoption of new tools, services and devices. Furthermore, even though when industry best practices are used, hackers and others may find ways to circumvent secured WLANs.

Moreover, when systems updates, monitoring and other best practices are employed, WLANs spectrum can offer security that is comparable to wired LANs. DeBeasi (2008) explained in Figure 4. one of the approaches used to secure wireless communications. This security approach uses strong authentication, public key infrastructure and encryption to protect WIMAX infrastructures.


References

Bellis, M. (n.d). The Histories of Computers. Retrieved on September 08, 2008 from

http://inventors.about.com/library/blcoindex.htm

Enriquez, J. (2001). As The Future Catches You. Three Rivers Press.

Halal, W. E. (2008). Technology’s Promises. Palgrave MacMillan

Leigh, A. & Wolfers, J. (2007). Prediction markets for business and public policy.

The Melborne Review. Retrieved from on 09/5/2008: http://scholar.google.com.

Krishnamoorthy, A. V., Zheng, X., Cunningham, J.E., Lexau, J., Ho, R., &

Torudbakken, O. (2008). Optical Interconnects for Present and Future High-Performance

Computing Systems.16th IEEE Symposium on High Performance Interconnects.

Sherden, W. A. (1998). The fortunes Sellers.

Van Lent, M. (2008). The Future is virtually Here. Entertainment computing. IEEE.

DeBeasi, P. (2008). WIMAX Tutoral. Retrieved on September 08, 2008 from

http://searchMobileComputing.techtarget.com/generi

/0,295582,sid40_gci1325355,00.html#security.

Sunday, September 7, 2008

Final Project Innovation Prediction Stage 1 blog

The convergence of the Laptop and the Cell Phone

Introduction

The availability of information and the quest to understand the evolution of technology and its use can be seen as the drivers that experts and others use to gauge where the future of technology will be in the years ahead. To the layman this may be referred to as a prediction. Several other terminologies are used to understand the evolution of technology relative to predictions. Determinism, forecasts, theories and others are some of the popular terminologies that are used to describe the intricacies of predictions (Sherden, 1998).

Nonetheless, the desire to know more and to compete in the current global economy fans the flames of predictions (Sherden, 1998). While experts and others make predictions on a daily basis, they do not always come through, nor do they all fail (Leigh & Wolfers, 2007). Although it is sometimes difficult to understand the true rational that drives one to predict, predictions are made daily and will continue to be made (Sherden, 1998).


Synopsis of the Computing Evolution

The history of modern computers might be traced to the inception and gains from the strides (advancement) made from LEDs, programming, operating systems, applications, circuit and circuit boards, transistors, storage devices, input and output devices, memory and other components. Undoubtedly, the demands for micro and mini computers have helped to pave the way for new generations of computing devices.

Laptops, and other handheld devices have benefited from the evolution of larger computing devices. In addition, the advent of wireless handheld devices provides instant communications with other systems, have become popular. Thus, it not uncommon to see a telecommuter, or a student with a laptop connected to a wireless handheld device to access the Internet. Usually these connections are either done with a cord, a PCMCIA or a USB card attached to the laptop or desktop. Figure 1. shows a cell phone used with a cord to access the internet.




Figure 1. Cell Phone broadband solution.

In figure 1., the cell phone can either be used for voice calls or data calls; it cannot be used for data and voice calls at the same time. Moreover, the Wireless PCMCIA Card in figure 2., is an option that customers can use to access the internet. Nonetheless, the card must be purchased seperately and broadband (data) service must also be purchased.

Figure 2. Wireless PCMCIA Card.

The speed and convenience that users obtain from these connections are impressive. Moreover, the solutions above show that users are forced to buy a wireless card to get broadband access if they need uninterrupted access to their cell phone.

The ubiquity of laptops has come a long way. They have gotten smaller, faster, lighter, cheaper and vendors are constantly pushing the envelope to launch new and exciting products to enhance the user experience. In the recent past, we have seen laptops that come with internal Wireless LAN cards. In addition, WIMAX technology is lurking the horizons and the technology is available to converge devices to enable true broadband.

Prediction

While cell phones can be used via a specialized cord to enable the same functionalities as modems to facilitate broadband connectivity, and wireless cards are available, the cost of having both can voice and data service at the same time can be prohibitive. The author predicts that the new frontier of convergence will foster laptops that have a built-in docking station for cell phones. The cell phone will sit on a docking interface on the laptop. It will allow the cell phone to charge, accept calls and enable broadband connectivity wirelessly to the laptop simultaneously.

For instance, while the phone is docked on the laptop, a few mouse clicks can be made to specialized software on the laptop to engage the phone to connect to the Internet. Through multiplexing, compression and other 3G technologies, the broadband capabilities will enable calls to be received via the blue tooth port on the phone, laptop or the speakers (speakerphone) on the laptop. This capability can also enable video conferencing for telemedicine (Halal, 2008).


References

Enriquez, J. (2001). As The Future Catches You. Three Rivers Press.

Halal, W. E. (2008). Technology’s Promises. Palgrave MacMillan

Leigh, A. & Wolfers, J. (2007). Prediction markets for business and public policy.

The Melborne Review. Retrieved from on 09/5/2008: http://scholar.google.com.

Sherden, W. A. (1998). The fortunes Sellers.

Sunday, August 31, 2008

Web 2.0 Tools -4 Podcast

video


Hello All,

This is my first podcast and I want to apologize for not speaking at the proper volume level throughout my podcast. Also, I did not use any video in this podcast but i included some cool pictures. Listening to my voice level is a clear indicator that i have not taken podcast 101..LoL.

It is truly one of the pitfalls that podcasters should avoid. Other pitfalls are speaking too fast or too slow or adding poor audio and video quality to content.

Nonetheless, podcasting is a great way to communicate and it was fun creating this podcast. The only issue that i had which took a "lot of time" was the media format. Moreover, I used Garageband; a tool that comes free with the newer Mac PCs.

Indeed, there are various other tools that can be used to create podcasts but I was not planning on exploring other options. Going forward, I hope that my schedule allows me to experiment more with podcasting. Thanks for listening and reading. Looking forward to yours

Regards,

HP Bookmite.

Wednesday, August 20, 2008

Web 2.0 Tools -3rd tool

Web 2.0 tools are becoming more popular as Internet connectivity becomes more available and computing costs fall. Web tools offer some unique features and functionality to enhance computing experiences. Thinkature uses Web 2.0 to allow users to be engaged in real-time collaboration on the web. Figure 1. shows some of the functionalities and feature that users can enjoy as they use Thinkature.



The shared workspace facilitates IM, meeting room, and white boards to name a few. It can be accessed from a web browser from anywhere. The voice chat feature enhances collaboration in real-time. Thinkature is a user friendly tool and it can be used to accomplish many goals. The following link can be used to find out more about this tool:

http://thinkature.com/about/


HP

Sunday, August 10, 2008

Successful Prediction

1. Prediction (Jakob Nielsen)

“Websites will give their users individualized service to build up relationships.”
Although Jakob did not specify dates for this prediction, more sites are offering users individualized services on the Internet.

http://www.useit.com/alertbox/9601_revisited.html

2.iPhone to juice demand for flash memory? By Jon Fortt.

As Jon Fortt claimed, in July 2007 the iPhone would need more memory and flash memory would be more appropriate. See Figure 1. At the time Phil Schiller, Apple’s VP of worldwide marketing did not heed the warning. Today apple is using a form of flash memory. Although this may seem somewhat simplistic, I have not read anyone on the record making such prediction till I read this. Others may have made similar claims but until its recorded (witness, documented or taped) in a manner where it can be corroborated, the first person to do record it gets to claim it.




http://bigtech.blogs.fortune.cnn.com/2007/07/30/iphone-to-juice-demand-for-flash-memory/

Figure 1. memory comparison.



3. E-Discovery - Evolution, Not Revolution.

This article by Dennis Kennedy, Published on June 10, 2006 exemplifies why e-discovery has become an important element in the legal arena, especially when it come to uncovering information about business practices in industry. Examples of e-discovery can be email conversations, systems logs for forensic purposes, stored files on personal and corporate computers which can be used to show cause. Although i am certain that it may have seemed far fetched at the time, e-discovery is here to stay.

While electronic surveillance have been around for some time, the notion of ones and zeroes being used in the legal communities for litigation purposes have taken evidence collection and analysis to another level. It has also proven to be helpful in seeking convictions for hacking and fraud. Another aspect of e-discovery can be looking at electronic copies of policies, procedures and processes to see if there are negligent (do not observe due care) which can cause product defect or result in grave service issues to consumers.

E-discoveries have proven to be helpful in fighting crimes because search warrants can be obtained to confiscate computers, media and other electronic records to solve crimes that involve the use of technologies:

http://www.llrx.com/features/giantleaps.htm


Regards.

Howard.

Saturday, August 9, 2008

Second Life Class The week of August 8th, 2008


Second Life Class

Although I enjoy the theatrics that video games and the movies provide for entertainment purposes, attending and participating in the Second Life class session it was certainly an exciting experience. Using objects to cerate cylinders, changing their dimensions and adding other features to me showed me boundless potential that second life is capable of. I captured the picture below to exemplify some of the fun that we experienced.





Regards,

Howard.

Thoughts on Dr. Rheingold's Video Blog

Dr. Rheingolds video blog exemplifies the power of communication by using modern technologies (forums) to share information that used to be very time consuming and difficult to track. Video blog has taken modern communications from unnecessary repetition (volumes of information in email inbox) as readers can make short comments (imbedded video, text and or graphics) on threads to convey information in a more efficient manner.

This powerful concept uses synchronous and asynchronous communication to reach individual and groups to share information globally. The following link has Dr. Rheingolds video blog:

http://vlog.rheingold.com/index.php/site/video/social-media-classroom-why-use-forums/

Regards

Howard.