1. Prediction (Jakob Nielsen)
“Websites will give their users individualized service to build up relationships.”
Although Jakob did not specify dates for this prediction, more sites are offering users individualized services on the Internet.
2.iPhone to juice demand for flash memory? By Jon Fortt.
As Jon Fortt claimed, in July 2007 the iPhone would need more memory and flash memory would be more appropriate. See Figure 1. At the time Phil Schiller, Apple’s VP of worldwide marketing did not heed the warning. Today apple is using a form of flash memory. Although this may seem somewhat simplistic, I have not read anyone on the record making such prediction till I read this. Others may have made similar claims but until its recorded (witness, documented or taped) in a manner where it can be corroborated, the first person to do record it gets to claim it.
Figure 1. memory comparison.
3. E-Discovery - Evolution, Not Revolution.
This article by Dennis Kennedy, Published on June 10, 2006 exemplifies why e-discovery has become an important element in the legal arena, especially when it come to uncovering information about business practices in industry. Examples of e-discovery can be email conversations, systems logs for forensic purposes, stored files on personal and corporate computers which can be used to show cause. Although i am certain that it may have seemed far fetched at the time, e-discovery is here to stay.
While electronic surveillance have been around for some time, the notion of ones and zeroes being used in the legal communities for litigation purposes have taken evidence collection and analysis to another level. It has also proven to be helpful in seeking convictions for hacking and fraud. Another aspect of e-discovery can be looking at electronic copies of policies, procedures and processes to see if there are negligent (do not observe due care) which can cause product defect or result in grave service issues to consumers.
E-discoveries have proven to be helpful in fighting crimes because search warrants can be obtained to confiscate computers, media and other electronic records to solve crimes that involve the use of technologies: