Monday, September 15, 2008

Final Project Innovation Prediction Stage 2

Final Project Innovation Prediction Stage 2

The convergence of the Laptop and the Cell Phone

Introduction

The availability of information and the quest to understand the evolution of technology and its use can be seen as some of the drivers that experts and others use to gauge where the future of technology will be in the years ahead. To the layman this is called a prediction. Several other terminologies that are used to understand the evolution of technology relative to predictions. Determinism, forecasts, theories and others are some of the popular terminologies that are used to describe the intricacies of predictions (Sherden, 1998).

Nonetheless, the desire to know more and to compete in the current global economy fans the flames of predictions (Sherden, 1998). While experts and others make predictions on a daily basis, they do not always come through, nor do they all fail (Leigh & Wolfers, 2007). Although it is sometimes difficult to understand the true rational that drives one to predict, predictions are made daily and will continue to be made (Sherden, 1998).


Synopsis of the Computing Evolution

The history of modern computers might be traceable to the inception and gains from the strides (advancement) made from LEDs, programming, operating systems, applications, circuit and circuit boards, transistors, storage devices, input and output devices, memory and other components (Bellis, n.d). Undoubtedly, the demands for micro and mini computers have helped to pave the way for new generations of computing devices.

Laptops, and other handheld devices have benefited from the evolution of larger computing devices. In addition, the advent of wireless handheld devices provides instant communications with other systems, have become popular. Thus, it not uncommon to see a telecommuter, or a student with a laptop connected to a wireless handheld device to access the Internet. Usually these connections are either done with a cord, a PCMCIA or a USB card attached to the laptop. Figure 1. Shows the un-converged devices used to make calls using a cell phone


Nonetheless, the speed and convenience that users obtain from these connections are impressive. Moreover, the user usually sacrifices the use of their cell phone to go online. Thus, the cell phone will not available for accepting or placing calls while it is connected to the laptop. The ubiquity of laptops has come a long way. They have gotten smaller, faster, lighter, cheaper and vendors are constantly pushing the envelope to launch new and exciting products to enhance the user experience. In the recent past, we have seen laptops that come with Wireless Local Area Networks (WLAN) cards and Worldwide Interoperability for Microwave Access (WIMAX) technology is lurking the horizons. Figure 2. Shows the projected growth for wireless communications.



Prediction

While cell phones can be used via a specialized cord to enable the same functionalities as modems to facilitate broadband connectivity, the author predicts that the new frontier of convergence will foster laptops that have a built-in docking station for cell phones. The cell phone will sit on (in) a docking interface on the laptop. It will allow the cell phone to charge, accept calls and enable broadband connectivity wirelessly to the laptop simultaneously. Fourth-generation (4G) wireless communications may be required to make sure that end-to-end connectivity receives the quality of service (QoS) necessary to enhance the end-user experience. Third Generation (3G) wireless technologies are here but they are not mature. 4G is expected to enable enhance use of the existing 3G technologies such as WiMAX and WiFi.



For instance, while the phone is docked on (in) the laptop, a few mouse clicks can be made to specialized software on the laptop to engage the phone to connect to the Internet. Through multiplexing, compression and other 3G/4G technologies, the broadband capabilities will enable calls to be received via the blue tooth port on the phone, laptop or the speakers (speakerphone) on the laptop. This capability (convergence) can also enable video conferencing for telemedicine (Halal, 2008).




With new and emerging technologies going to market on a daily basis, products that are untested along with poor design practices can impede the adoption of new tools, services and devices. Furthermore, even though when industry best practices are used, hackers and others may find ways to circumvent secured WLANs.

Moreover, when systems updates, monitoring and other best practices are employed, WLANs spectrum can offer security that is comparable to wired LANs. DeBeasi (2008) explained in Figure 4. one of the approaches used to secure wireless communications. This security approach uses strong authentication, public key infrastructure and encryption to protect WIMAX infrastructures.


References

Bellis, M. (n.d). The Histories of Computers. Retrieved on September 08, 2008 from

http://inventors.about.com/library/blcoindex.htm

Enriquez, J. (2001). As The Future Catches You. Three Rivers Press.

Halal, W. E. (2008). Technology’s Promises. Palgrave MacMillan

Leigh, A. & Wolfers, J. (2007). Prediction markets for business and public policy.

The Melborne Review. Retrieved from on 09/5/2008: http://scholar.google.com.

Krishnamoorthy, A. V., Zheng, X., Cunningham, J.E., Lexau, J., Ho, R., &

Torudbakken, O. (2008). Optical Interconnects for Present and Future High-Performance

Computing Systems.16th IEEE Symposium on High Performance Interconnects.

Sherden, W. A. (1998). The fortunes Sellers.

Van Lent, M. (2008). The Future is virtually Here. Entertainment computing. IEEE.

DeBeasi, P. (2008). WIMAX Tutoral. Retrieved on September 08, 2008 from

http://searchMobileComputing.techtarget.com/generi

/0,295582,sid40_gci1325355,00.html#security.

Sunday, September 7, 2008

Final Project Innovation Prediction Stage 1 blog

The convergence of the Laptop and the Cell Phone

Introduction

The availability of information and the quest to understand the evolution of technology and its use can be seen as the drivers that experts and others use to gauge where the future of technology will be in the years ahead. To the layman this may be referred to as a prediction. Several other terminologies are used to understand the evolution of technology relative to predictions. Determinism, forecasts, theories and others are some of the popular terminologies that are used to describe the intricacies of predictions (Sherden, 1998).

Nonetheless, the desire to know more and to compete in the current global economy fans the flames of predictions (Sherden, 1998). While experts and others make predictions on a daily basis, they do not always come through, nor do they all fail (Leigh & Wolfers, 2007). Although it is sometimes difficult to understand the true rational that drives one to predict, predictions are made daily and will continue to be made (Sherden, 1998).


Synopsis of the Computing Evolution

The history of modern computers might be traced to the inception and gains from the strides (advancement) made from LEDs, programming, operating systems, applications, circuit and circuit boards, transistors, storage devices, input and output devices, memory and other components. Undoubtedly, the demands for micro and mini computers have helped to pave the way for new generations of computing devices.

Laptops, and other handheld devices have benefited from the evolution of larger computing devices. In addition, the advent of wireless handheld devices provides instant communications with other systems, have become popular. Thus, it not uncommon to see a telecommuter, or a student with a laptop connected to a wireless handheld device to access the Internet. Usually these connections are either done with a cord, a PCMCIA or a USB card attached to the laptop or desktop. Figure 1. shows a cell phone used with a cord to access the internet.




Figure 1. Cell Phone broadband solution.

In figure 1., the cell phone can either be used for voice calls or data calls; it cannot be used for data and voice calls at the same time. Moreover, the Wireless PCMCIA Card in figure 2., is an option that customers can use to access the internet. Nonetheless, the card must be purchased seperately and broadband (data) service must also be purchased.

Figure 2. Wireless PCMCIA Card.

The speed and convenience that users obtain from these connections are impressive. Moreover, the solutions above show that users are forced to buy a wireless card to get broadband access if they need uninterrupted access to their cell phone.

The ubiquity of laptops has come a long way. They have gotten smaller, faster, lighter, cheaper and vendors are constantly pushing the envelope to launch new and exciting products to enhance the user experience. In the recent past, we have seen laptops that come with internal Wireless LAN cards. In addition, WIMAX technology is lurking the horizons and the technology is available to converge devices to enable true broadband.

Prediction

While cell phones can be used via a specialized cord to enable the same functionalities as modems to facilitate broadband connectivity, and wireless cards are available, the cost of having both can voice and data service at the same time can be prohibitive. The author predicts that the new frontier of convergence will foster laptops that have a built-in docking station for cell phones. The cell phone will sit on a docking interface on the laptop. It will allow the cell phone to charge, accept calls and enable broadband connectivity wirelessly to the laptop simultaneously.

For instance, while the phone is docked on the laptop, a few mouse clicks can be made to specialized software on the laptop to engage the phone to connect to the Internet. Through multiplexing, compression and other 3G technologies, the broadband capabilities will enable calls to be received via the blue tooth port on the phone, laptop or the speakers (speakerphone) on the laptop. This capability can also enable video conferencing for telemedicine (Halal, 2008).


References

Enriquez, J. (2001). As The Future Catches You. Three Rivers Press.

Halal, W. E. (2008). Technology’s Promises. Palgrave MacMillan

Leigh, A. & Wolfers, J. (2007). Prediction markets for business and public policy.

The Melborne Review. Retrieved from on 09/5/2008: http://scholar.google.com.

Sherden, W. A. (1998). The fortunes Sellers.

Sunday, August 31, 2008

Web 2.0 Tools -4 Podcast




Hello All,

This is my first podcast and I want to apologize for not speaking at the proper volume level throughout my podcast. Also, I did not use any video in this podcast but i included some cool pictures. Listening to my voice level is a clear indicator that i have not taken podcast 101..LoL.

It is truly one of the pitfalls that podcasters should avoid. Other pitfalls are speaking too fast or too slow or adding poor audio and video quality to content.

Nonetheless, podcasting is a great way to communicate and it was fun creating this podcast. The only issue that i had which took a "lot of time" was the media format. Moreover, I used Garageband; a tool that comes free with the newer Mac PCs.

Indeed, there are various other tools that can be used to create podcasts but I was not planning on exploring other options. Going forward, I hope that my schedule allows me to experiment more with podcasting. Thanks for listening and reading. Looking forward to yours

Regards,

HP Bookmite.

Wednesday, August 20, 2008

Web 2.0 Tools -3rd tool

Web 2.0 tools are becoming more popular as Internet connectivity becomes more available and computing costs fall. Web tools offer some unique features and functionality to enhance computing experiences. Thinkature uses Web 2.0 to allow users to be engaged in real-time collaboration on the web. Figure 1. shows some of the functionalities and feature that users can enjoy as they use Thinkature.



The shared workspace facilitates IM, meeting room, and white boards to name a few. It can be accessed from a web browser from anywhere. The voice chat feature enhances collaboration in real-time. Thinkature is a user friendly tool and it can be used to accomplish many goals. The following link can be used to find out more about this tool:

http://thinkature.com/about/


HP

Sunday, August 10, 2008

Successful Prediction

1. Prediction (Jakob Nielsen)

“Websites will give their users individualized service to build up relationships.”
Although Jakob did not specify dates for this prediction, more sites are offering users individualized services on the Internet.

http://www.useit.com/alertbox/9601_revisited.html

2.iPhone to juice demand for flash memory? By Jon Fortt.

As Jon Fortt claimed, in July 2007 the iPhone would need more memory and flash memory would be more appropriate. See Figure 1. At the time Phil Schiller, Apple’s VP of worldwide marketing did not heed the warning. Today apple is using a form of flash memory. Although this may seem somewhat simplistic, I have not read anyone on the record making such prediction till I read this. Others may have made similar claims but until its recorded (witness, documented or taped) in a manner where it can be corroborated, the first person to do record it gets to claim it.




http://bigtech.blogs.fortune.cnn.com/2007/07/30/iphone-to-juice-demand-for-flash-memory/

Figure 1. memory comparison.



3. E-Discovery - Evolution, Not Revolution.

This article by Dennis Kennedy, Published on June 10, 2006 exemplifies why e-discovery has become an important element in the legal arena, especially when it come to uncovering information about business practices in industry. Examples of e-discovery can be email conversations, systems logs for forensic purposes, stored files on personal and corporate computers which can be used to show cause. Although i am certain that it may have seemed far fetched at the time, e-discovery is here to stay.

While electronic surveillance have been around for some time, the notion of ones and zeroes being used in the legal communities for litigation purposes have taken evidence collection and analysis to another level. It has also proven to be helpful in seeking convictions for hacking and fraud. Another aspect of e-discovery can be looking at electronic copies of policies, procedures and processes to see if there are negligent (do not observe due care) which can cause product defect or result in grave service issues to consumers.

E-discoveries have proven to be helpful in fighting crimes because search warrants can be obtained to confiscate computers, media and other electronic records to solve crimes that involve the use of technologies:

http://www.llrx.com/features/giantleaps.htm


Regards.

Howard.

Saturday, August 9, 2008

Second Life Class The week of August 8th, 2008


Second Life Class

Although I enjoy the theatrics that video games and the movies provide for entertainment purposes, attending and participating in the Second Life class session it was certainly an exciting experience. Using objects to cerate cylinders, changing their dimensions and adding other features to me showed me boundless potential that second life is capable of. I captured the picture below to exemplify some of the fun that we experienced.





Regards,

Howard.

Thoughts on Dr. Rheingold's Video Blog

Dr. Rheingolds video blog exemplifies the power of communication by using modern technologies (forums) to share information that used to be very time consuming and difficult to track. Video blog has taken modern communications from unnecessary repetition (volumes of information in email inbox) as readers can make short comments (imbedded video, text and or graphics) on threads to convey information in a more efficient manner.

This powerful concept uses synchronous and asynchronous communication to reach individual and groups to share information globally. The following link has Dr. Rheingolds video blog:

http://vlog.rheingold.com/index.php/site/video/social-media-classroom-why-use-forums/

Regards

Howard.
Web 2.0 Tools that are commonplace in today’s computing environment

• I use Goggle to get driving directions sometimes
• I use LinkedIn (to network and keep in touch with colleagues)
• I use Moodle (for classes at CTU)
• I use Second Life (for classes at CTU)
• I use EBay (to buy and sell stuff)
• I use Wikipedia for (information on general stuff generally accurate) information

I use the above Web 2.0 tools above because they provide a wealth of information to share information, purchase and sell items.
As a student of CTU, Moodle and Second life are tools that are required to facilitate the learning via telecommuting. Although these tools provide the opportunity to share information in real-time and sometimes asynchronously, they help to enable information sharing using modern technologies. These tools are intuitive and easy to learn and use.

The following link is Linkedin:
https://www.linkedin.com/?trk=linkedin1&gclid=CPrB2fm0gZUCFRdinAodK3NPqQ

The following link us EBay:
http://hub.ebay.com/buy

The following link provides excellent information on an upcoming Web 2.0 Expo:
http://en.oreilly.com/webexny2008/public/content/home

Regards,

Howard.

Thursday, July 31, 2008

Predictions? or a poor understanding of it?

“Remote shopping, while entirely feasible, will flop - because women like to get out of the house, like to handle merchandise, like to be able to change their minds.

TIME, 1966, in one sentence writing off e-commerce long before anyone had ever heard of it.”

http://en.wikiquote.org/wiki/Talk:Incorrect_predictions

http://www.2spare.com/item_50221.aspx

The prediction above is a classic example of the notion that opinions are rendered on behaviors that are predictive in nature without sufficiently investigating or understanding technologies vs. human behavior. The person/entity who made this prediction probably did not truly understand what was going on in the technology space at the time.

Indeed, technology and its use have come a long way, but there was no substantive basis given to support this prediction, so it begs the questions, what’s the accepted definition of a prediction and how must it be rendered for it to be valid?

As predicted above, the billions of dollars of products that women purchased yearly on the Internet is a typical refutation to poor predictions and or a misunderstanding of how predictions ought to be made and supported.

Regards,

Howard.

 

 

Predictions?

After reading through the Fortune Sellers, I could not help think about the work that we are doing relative to predictions and the approaches that different people use. Because different people make predictions for different reasons/motives/justifications, I am further convinced that at times predictions can be seen as just noise.

Further more, I often ask myself what’s the motives when I see/hear certain predictions? Usually they are self-explanatory, but I am usually concerned when those who are well respected in certain communities make predictions that are way off in left field.  Nonetheless, I feel that predictions can serve as an impetus to get the idea (creative and otherwise) juices flowing, which can impact the outcomes of predictions. 

I feel this way, as research is one method we use to obtain valuable information about challenges, areas for further research etc., which can be linked a prediction(s). The interesting thing is that we are not always aware of the new frontiers that are being explored until they are made public. When they are made public how do we tie (associate) them to predictions?

What should be the requirements for making predictions?

Should predictions be required to have a format to ensure that there is some validity and or basis for making them?

Who gets to decide if predictions have failed or passed and how should that be determined?

 

 

Regards,

 

Howard.

Sunday, July 27, 2008

Howard's Ted Write up

Getting cars off the road and data into the skies

By

Robin Chase

http://www.ted.com/index.php/talks/robin_chase_on_zipcar_and_her_next_big_idea.html

Robin Chase, the founder of Zipcar presented a great proposition on. Reducing CO2, Road Congestion, cost of technology, reductions in car ownership cost etc. Her propositions included using available public (buses etc.) transportation and private devices such as portable wireless devices to form wireless mesh networks for inter state communication.

Some of the benefits that she proposed are:
• Reduced congestions.
• Reduced CO2 emissions
• Reduce driving cost
• Low communications cost.

These benefits can be achieved through congestion pricing, and a Wireless Interstate Mesh System to enable the communication. The economies of scale that can be realized from this proposition are:

• Greater utility of the transportation systems
• Just in time public transportation lookup and ticket purchasing.
• Increased social interaction through a carpooling system.
• Reduction in the mileage driven per year

Robin stressed that we should not wait. This needs to happen now and the Federal Government needs to get involved sooner than later.

Thursday, July 10, 2008


CS-855 Introduction

1. Introduce yourself

Hi, my name is H and I am currently pursuing my Doctoral Degree in Computer Science - Enterprise Information Systems at Colorado Technical University. I have over 18 years hands on experience in various facets of IT (Wireless LAN, Security, Compliance, Networking Engineering, Implementation, Disaster Recovery, Policies etc,).

2. Identify your area of expertise or interest (real or desired)

With an extensive background in Information Technology, my true passion is in the Wireless Space and IT Security. As a child growing up in the carribean I was always intrigued by RF (Radio Frequency) even though I had no clue about telecommunications. In addition, I had no training in Physics in high school. Nonetheless, I was fortunate to earn my Masters Degree in Telecommunications and it paved the way for me to experience new frontiers in that regard. It is my goals to contribute to the body of knowledge and give back in some way within the telecommunications discipline.

3. Describe your dreams for what will be needed in 10-15 years

My ultimate dream is to pay off my mortgages, LoL. Moreover, relative to my career, I would like to be in a position where I can produce top-notch research, teach and share some of the knowledge that I have amassed during my tenure. In addition, I would like to stay on the cutting edge of Telecommunications and Security.

4. List two cool new technologies that you would like to pioneer

I am mindful of the limitations of RF relative to moisture. Moisture absorbs RF and causes RF signal attenuation and degradation etc, I

would like to be involved with cutting edge research that can resist RF signal absorbed by moisture.

Distance is another signal attenuating problem that plagues RF so repeaters are necessary to regenerate weak signals to make them readable by receivers. It will be very enlightening to be involved in research that would improve the attenuation issues that is prone to RF.

Regards,

Howard