Synopsis: Ict: Communication systems: Telecommunication:


gizmag 2013 00001954.txt

Epler's thesis project for NYU's Interactive Telecommunications Program, the Kinograph uses software to stabilize a series of captured images and extract optical sound.

and a few components that can be cheaply sourced over the internet. This means that a decent DSLR will be the most expensive part of the setup,


gizmag 2013 00002003.txt

As part of the recent Google Science Fair Texas teen Alex Spiride recently showed off his own bio-inspired Squid-Jet underwater vehicle e


gizmag 2014 0000194.txt

One issue for small hold farmers in the developing world is access to information and according to the United Nation development and humanitarian news website, IRIN,

The Economist reported last year that Ethiopia lags behind its neighbors in terms of cell phone penetration;

only 25 percent of its 90 million people use cell phones compared with the regional average of 70 percent."


gizmag.com 2015 0000101.txt

"The architecture is built on Ethernet computer networking technology, "said Choset.""Ethernet doesn't require that the computers connected to it be of a specific type,

but that they all communicate with each other in the same way. The interfaces used in the modular architecture allow robot designers to focus on specific capabilities without having to worry about detailed systems issues


gizmag.com 2015 0000121.txt

and they're going to be the headset's core audience at launch. But in the long run we believe the product has the potential to transcend gaming.

Let's take a look at eight future uses for the best virtual reality headset. The Oculus Rift could ultimately transform movies at least as much as it does gaming.

but why couldn't we eventually have movie theaters full of Oculus headsets? What you'd miss in communion with your fellow moviegoers would be made more than up for with a feeling that you were standing in the middle of the movie's action.

Of all the companies to buy Oculus VR why Facebook? Well perhaps Mark Zuckerburg saw a little of himself in the young innovators running the hot startup

because he saw a new future for social media. Imagine a future version of Facebook where instead of posting photos of your lunch on your wall you have a Second life-like avatar

and can mill about with virtual versions of your high school class or family members who live on the other side of the world.

So why not pimp your ride with a few Oculus headsets? Then instead of staring at miles

but imagine a future world where we each have telepresence robots that we control from home using virtual reality headsets.


gizmag.com 2015 0000126.txt

That slick, smartphone-sized portable looks like a design-forward mouse or set-top box but is actually a go-anywhere isometric exercise gizmo.

no-hassle workout while you watch TV, read or otherwise unwind after a day of work.


gizmag.com 2015 0000264.txt

but they suffered a loss of active site surface area. Panasonic has found a way to bind the Tio2 to another particle zeolite (a commercial adsorbent and catalyst)

which solves that problem by enabling photocatalysts to maintain their active site. And the method requires no binder chemicals


gizmag.com 2015 000044.txt

#A new type of glass could double your smartphone's battery life The batteries inside our smartphones

He added that the vanadate-borate glass compound his team has developed could extend smartphone battery life by 1. 5 to 2 times


impactlab.net 2015 00002.txt

This will open new application possibilities to utilize printable solar cells e g. in Iot (Internet of things) type applications, in


impactlab.net 2015 000054.txt

#Abusive Spouses are Using Spyware to Track their Victims The use of surveillance software by abusive spouses to monitor the phones

Helplines and women refuge charities have reported a dramatic rise in the use of spyware apps to eavesdrop on the victims of domestic violence via their mobiles and other electronic devices,

The Independent has established that one device offering the ability to spy on phones is being sold by a major British high-street retailer via its website.

or former partner, using Christmas or birthday presents such as phones, computers and toys pre-loaded with spyware to infiltrate a target home.

and increase their control. e increasingly hear stories of abusers adding tracking software to phones,

and using the internet to gather information about their partner. Many software packages are marketed openly as tools for covertly tracking a heating wife

or smartphone is virtually untraceable to the user. Nearly all offer a GPS tracking function,

as well as covert access to keystrokes, texts, pictures and emails. The Independent has been told of a case where a woman had a conversation she had held with a friend on her mobile played back to her by her partner,

who had bugged her phone with spyware. He then told her he had connections with criminals

and had had killed people. In another incident an abusive husband managed to gain access to his spouse ebay account using spyware

and found a delivery address. He then lay in wait and attacked his wife in an assault so vicious that she lost sight in one eye.

In failed relationships, tales are rife of email accounts being hacked to send abusive messages to a spouse friends or employer.

The tracking packages are widely available on the internet with many marketed as ways for employers to monitor the movements of their workers

lexispy lets you conduct pycalls remotely activating the phone microphone to listen in on its surroundings. This is particularly useful once you confirm she not actually where she told you she was.

the eavesdropping technology is also available in Britain through specialist retailers and also the website of the high-street electronics retailer Maplin.

emails and calls and also keep track of a mobile phone location The website of the manufacturer, Cell Phone Recon,

nstalling on the phone is very fast and simple, you will be able to read all texts sent

Maplin changed the description of the device to ell phone backup softwareand amended the answer to the customer question to make it clear that it should only be used with the permission of a phone owner.


impactlab.net 2015 000063.txt

Over a period of 25 years, between 1955 and 1980, more than 50 corporations left New york city, including IBM, Gulf Oil, Texaco, Union carbide, General Telephone, Xerox, Pepsico and U s. Tobacco.

Corporate giants like Motorola, Coca-cola and Yahoo have made well-publicized moves toward downtown Chicago, Atlanta and San francisco (respectively) to attract


impactlab.net 2015 000071.txt

is a design element in everything from Android phones to car steering wheels. Because the technology is currently relatively primitive in the mass market,

it mainly used for more day-to-day purposes like simulating the feel of a tactile keyboard on a smartphone

Check out Youtube Video Article by Neal Ungerleider Article Source:


impactlab.net 2015 00008.txt

#Tesla motors#Destination Charging#:#Fast-growing Network Beyond Superchargers One of the most commonly cited arguments against electric cars is range anxiety.

The Destination Charging network Youl find these charging locations on Tesla website listed as Charging Partners.

and even mobile phone stores. In the U s.,Wall Connectors are showing up at well-known names like Costco, Hyatt, Four Seasons, Ritz-Carlton, Best western, and Westin.

the company sells the contraption on its website for $650. And the installation of a 240-volt circuit isn expensive probably no more than $3, 000 and as little as $500.


impactlab_2010 00336.txt

I do with my phone? It in the refrigerator, said one instructor, explaining memory loss. ave you seen someone like that?


impactlab_2010 00551.txt

She said an advantage of the Internet is that students can stop the lecture and rewind when they do not understand something.


impactlab_2010 02347.txt

then automatically relays the information to a forest station through mobile phone technology. he heat sensors are programmed to detect temperatures which are over 45 degrees Celsius,

That immediately triggered a call to his mobile phone. his is how the system is expected to work,


impactlab_2011 01643.txt

#Wave and Paymobile Phone Payment system Launched in the UK Orange and Samsung have teamed-up with Barclaycard to provide mobile phone payments with the new uick Tappayment technology.

Like the abolition of the £1 note or the introduction of the £2 coin, yesterday was a historic day for British money.

Courtesy of Barclaycard, Orange and Samsung, consumers across the UK can now pay for goods and services with nothing more than a mobile phone.

Yougov research, commissioned by digital payments provider Intelligent Environments, says 42 per cent of smartphone users want to use their phones as mobile wallets.

Owners of the Apple iphone are keenest, but significant proportions of Blackberry and Google phone users want to take advantage of it too.

That not because technology built into mobile phones is the way that everything, from cameras to translators, seems to be going.

It down to the fact that this new mobile-based method is quick simpler and crucially, more secure than anything wee got available at the moment.

Barclaycard has quietly been rolling out so-called ontactlesspayment systems across the UK for several years

With a mobile phone data connection, however, all transactions can be authorised and completed instantly. In due course, transactions over £15 will be permitted

if a pin is entered on the mobile phone. That, too, is more secure than the traditional keypad.

however, is that for now only one phone, one payment provider and one network operator provides this whizzy technology.

Even though the ear-field communicationstechnology is built into a wide and growing number of phones already,

Using an app on the mobile phone, customers can top up their wave and pay account from a connected credit

even if rumours that NFC payments are to be built into the forthcoming iphone turn out to be untrue,

Google is working with Mastercard and a host of other manufacturers have similar plans. Indeed, as with almost all significant new technology, the appeal is mainly in the simplicity of NFC.


impactlab_2011 01830.txt

who appears in television commercials and online games as well as on cereal boxes. Regulators are asking food makers

including television and print ads, Web sites, online games that act as camouflaged advertisements, social media, product placements in movies, the use of movie characters in cross-promotions and fast-food children meals.

The inclusion of digital media such as product-based games, represents one of the government strongest efforts so far to address the extension of children advertising into the online world,

Ronald Mcdonald and the movie and television characters used to promote food. It also raises the question of

Jeffrey Chester, executive director for the Center for Digital Democracy, a group that focuses on Internet marketing to children, said the F. T. C. proposal had broader implications. he youth obesity issue has placed all


impactlab_2011 02662.txt

who in some stores can wave a smartphone above an apple or orange and learn instantly where it was grown,

consumers could tap into through their computers or cellphones. The ne step forward, one step backtraceability requirement for processed food and produce is designed to make it easier for the Food

Shoppers can scan the sticker with a smartphone or go to the Harvestmark website and enter the number from the sticker to learn the path the food has taken

and other information the farmer chooses to share, such as the harvest date. here been a very rapid sea change in consumer behavior,

said Elliott Grant, the chief marketing officer for Harvestmark. ith very high-profile food recalls, cellphones and iphones,

does not own a television, use e-mail or have Internet service. Harvestmark provides him with a laptop computer

and preprinted bar code stickers for his melons. And during harvesting, he takes the laptop to a bank

or some other place with Internet service to upload the data to Harvestmark. One day he was surprised to get a letter from an unhappy customer who had tracked down his address from the Harvestmark sticker.


impactlab_2013 00002.txt

The 13-page report describes initiatives ranging from the high-tech (500 officers have received Samsung Rugby smartphones equipped to deliver real-time crime data) to the bureaucratic (new guidelines for recruiting


impactlab_2013 00003.txt

Via Smithsonian Share Thissubscribedel. icio. usfacebookredditstumbleupontechnorati swfobject. embedswf (http://www. youtube. com/v/7rs1z9xigua& rel=0&

showinfo=0, vvq-115090-youtube-1, 425,355, 9, vvqexpressinstall, vvqflashvars, vvqparams, vvqattributes) 5


impactlab_2013 00014.txt

#Edible batteries could power smart medicine pills A flexible biodegradable battery just may be what the doctor ordered.


impactlab_2013 00022.txt

Smartphone apps can be built for less than $10k, so who needs an investor? Startup incubators and accelerators are popping up everywhere.

Social media is a boon for entrepreneurs and startups. With the key social media platforms today, an entrepreneur can tune a product

build a brand, and grow the business with very low cost and a high interactivity never before possible.

The next Web Via Forbes Share Thissubscribedel. icio. usfacebookredditstumbleupontechnorat e


impactlab_2013 00026.txt

#Scientists create robotic muscle that is 1, 000 times more powerful than human muscles A robotic muscle 1,

as researchers at the US Department of energy s (DOE) Lawrence Berkeley National Laboratory have found, the Lab s website#reported.

Via RT Share Thissubscribedel. icio. usfacebookredditstumbleupontechnorati swfobject. embedswf (http://www. youtube. com/v/BWUOHOCN UG& rel=0&

showinfo=0, vvq-114963-youtube-1, 425,355, 9, vvqexpressinstall, vvqflashvars, vvqparams, vvqattributes


impactlab_2013 00027.txt

#3d printed eye cells could one day cure blindness Researchers have printed actually viable retina cells using an inkjet printer.


impactlab_2013 00029.txt

#The cyborg future of telemarketing While a human is picking up the phone, and a human is dialing the phone,

it may not be a conversation between two humans. In the future humans will interact with each other, and machines,

His phone rings. It s a telemarketer for a home security service.####This is Richard, how are you today?##

#Because while a human is picking up the phone, and a human is dialing the phone,

this is not,#strictly speaking, a conversation between two humans. Instead, a call-center worker in Utah or the Philippines is pressing buttons on a computer, playing through a marketing pitch without actually speaking.

Here are two samples Avatar provides on its website,##Dale Harris##from the US and##Samantha##from Australia:

On the Internet, no one may know you re a dog, but on the phone? It just#seems#wrong.

What good could spring from a bunch of conversations in which one member is ventriloquizing through a machine?

Then I checked my Twitter account and favorited several tweets. I retweeted a couple, too.

In an email, Ugarte ticked off the reasons for using voice technology. 1. Accent##some of our agents though can speak English really well have problems with their accents

and maintains several other prominent social media presences. He likes to post photos from his childhood on Facebook,

along with portraits of himself in drag. I asked him, over email, to tell me what the experience of working at a soundboard call center is like.

How do people feel about it?####Based on feedbacks and observations, working on a Non-Voice company such as Perfect pitch is fun not to mention that there is less stress on the part of the reps,

##Their Youtube channel shows them#holding an#American Idol-style competition to celebrate their one-year anniversary.

and the southern paper-mill plant managers that I managed to get on the phone were swayed not by my lispy, northwestern English.#

when they hear a voice on the phone, it matches up exactly with a person in the world,

CNN Via The Atlantic#Share Thissubscribedel. icio. usfacebookredditstumbleupontechnorati swfobject. embedswf (http://www. youtube. com/v/BZUXVYUZFVI&

showinfo=0, vvq-114947-youtube-1, 425,355, 9, vvqexpressinstall, vvqflashvars, vvqparams, vvqattributes) a


impactlab_2013 00031.txt

#Hawaii s solar boom is so successful it s been blocked from further expansion Rooftop solar on a house in Hawaii.

The new HECO policy was included deep in the text of emails the Walkers solar contractor had sent,


impactlab_2013 00040.txt

We, the searchable In Mid-january,#Facebook introduced Graph Search, a way for the average user to tap into the social network s web of interconnected human intelligence.

Instead, Facebook automated the process of querying its users relationships with one another, their tastes and everything else with a##public##setting.

In April Facebook#introduced##partner categories, ###letting advertisers target users not only on the basis of their##likes##on the site,

but also by correlating that with data about what they buy through other web services.####OK, now I m convinced Facebook is#trying#to be creepy,

##my colleague Derrick Harris#wrote. Limited glimpses Publicly posted information is one thing, but what about private posts and communications?

Most people were aware that law enforcement agencies and governments ordered web companies to give up data on individuals of interest,

but the scale of this trend has always been difficult to nail down. On this front, Google has led always the way,

and the January 2013 edition of its semiannual Transparency Report showed the numbers of such requests had increased 70 percent between 2009 and 2012.

Facebook said at the time that it had#no plans#to release such information to the public

However, while Google covered itself with more glory than most on this aspect of transparency,

The company was fined by a German privacy regulator#for the 2010 siphoning of people s passwords and communications by Google s Street view cars.

the unification of Google s disparate services represented an attempt to do new and serious things with people s information without true permission,

A lot of people were unhappy about Google search and Maps##and Google+##knowing about their Youtube commenting habits.

However, although European privacy laws are significantly stronger than those in the U s a February survey showed that#Americans are nearly as keen as Europeans on protecting their online privacy.

The Ovum study also demonstrated an overwhelming lack of trust in internet companies honesty about data protection;

Google said Glass would gain the same functionality, which also became a feature of the#Moto X#smartphone.

Apps#got in on the act. All listening, all the time. Glass wasn t the only wearable computer with eavesdropping potential.

Britain s#Guardian newspaper#ran a story alleging that the U s. carrier Verizon was handing over call records to the National security agency, America s signals intelligence operation.

Many don t recognize that our digital data##from cell phones, connected devices and our social media profiles##combined with powerful computing

and analytics can create detailed histories of our lives, our habits and our actions.####The next story was even more explosive.

It alleged that the NSA had#direct access to the servers#of the big U s. tech firms, such as Google, Microsoft and Apple.

and transmitted through American web services. As well they might. While Snowden had ignited a#debate in the U s.#about the constitutional protections that U s. citizens were supposed to be enjoying in their home country,

With the advent of the web, that data-gathering activity took on new dimensions. And now we knew about it.#

Slow clarity Early surveys#showed most Americans#weren bothered t that#about the NSA recording their cellphone metadata.

It can also involve knocking on the door of Google or Facebook. Even without the firepower that can be brought to a targeted investigation

A U s. federal judge has taken this view#in relation to the Verizon metadata. There are at least a few recorded cases of NSA employees using their power tostalk crushes

but the trust system that governs web security has#integral flaws that need addressing. As the closures of#Lavabit and the Silent Mail service#showed,

Google, Microsoft, Apple and others appeared utterly complicit with the NSA, as though they were happily inviting them into their data centers for a look around,

Knowing that, many of the big web companies were scarcely encrypting the data they held in storage, let alone the connections between their data centers.

the likes of Facebook and#Apple#are now a whole lot more keen about#transparency when it comes to government data requests, perhaps in order torescue their public image.

and Germany s big telcos to consider the merits of keeping local-to-local internet traffic#within their borders.

This has led to fears of a##balkanization##of the web, with unpleasant censorship potential. However, the web s globally interconnected nature makes this a tall order at best.

What does look set to happen is a legal and technical reinforcement of online privacy. The United nations is#working on a resolution#affirming that human rights apply online as well as offline,

and on the technical side the web may soon beencrypted by default. But what of the tech firms

whose services have been hijacked so successfully by the NSA and its partners? Facebook is still quietly doing

what it can to#stop users from protecting their privacy. And Google, which delighted privacy advocates in July by releasing an Android feature called#App Ops#that made it possible to turn off specific tracking functionalities in individual apps,

pulled that feature in a later Android update, claiming it had been included by accident. The online ad industry is also doing its best to ensure everyone remains trackable.

a browser feature that s supposed to dissuade websites from tracking internet use with cookies.

whereby#smart trashcans scoop up identifying information#from passing smartphone users, and retail chain Tesco started#scanning customers faces#as they stand in line to pay.

And then we have the#profound privacy implications#of the emerging internet of things. Each case needs to be evaluated on its own merits,

Sure, many suspected and some knew that the internet is a giant monitoring system, but anyone paying the slightest bit of attention must now realize that everything they do online

##and increasingly offline too##is enabled open to tech surveillance. Anyone carrying a mobile device should now understand that they are being tracked constantly.

Can we create popular internet business models that don t make the user a well-described product?


impactlab_2013 00048.txt

The innovations will bring the power of the Web right to where the shopper can touch it.

The Web can make sales associates smarter, and augmented reality can deliver more information to the store shelves.

where IBM researchers are working with#a crowdsourcing toolthat people can use to report accessibility problems, via their mobile phones,


impactlab_2013 00053.txt

We could access the Internet control electronics, and make phone calls, with just our thoughts. In addition, we would understand complicated subjects;


impactlab_2013 00055.txt

#Will the Internet of Thing replace the web? Apple stores can already pinpoint your location with unprecedented accuracy. 2014 will be the year that the##internet of things###that effort to remotely control every object on earth##becomes visible in our everyday lives.

But most of us don t recognize just how far the internet of things will go, from souped-up gadgets that track our every move to a world that predicts our actions and emotions.

In this way, the internet of things will become more central to society than the internet#as we know it today.#

#The web will#survive, just as email survived the arrival of the web. But its role will be reduced to that of a language for displaying content on screens,

which are likely to be more ubiquitous but less necessary. Here s a closer look at the internet of things that s already here,

and where it s headed. NOTE:##It s never too late to become an invisible button pusher

and learn programming skills. More at Davinci Coders. The internet of things will create a world of##invisible buttons##The#pioneer species#of the internet of things is the smartphone.

For example,#every time we take a smartphone with us in a car, it beams information on our location and speed to Google.

The result is real-time traffic information that can be used by everyone. That smartphones gather traffic data without their users ever being aware that they re doing

so shows how the internet of things replaces the internet-related actions we already know##click a button,

navigate a webpage##with context. This awareness, especially as it relates to where we are in the physical world,

and whatever other data Google and other companies have about us, leads to what#Amber Case, a researcher for mapping company Esri,#calls##invisible buttons.##

a smartphone##moves into that physical space. It could be as small as a two-inch square on top of a conventional credit card reader,

such as the time of day, our previous actions, the actions of others or what Google knows about our calendar,

That we currently need a cell phone to act as a proximity sensor is just an artifact of where the technology is at present.

The same can be accomplished with any number of other internet-connected sensors. GE and Quirky s motion, sound, light, temperature and humidity sensor#

internet-connected smart energy systems can figure out you re home the moment you switch on a light.

Apple s play for the internet of things Apple seems keen on the idea of invisible buttons.

which allows any newer iphone or Android phone to#know its position in space with centimeter precision.

which shows that Apple is trying to dominate a technology that could become ubiquitous across phones.

This means invisible spatial buttons that could be so small that touching your smartphone smartwatch or other equipped device to a surface will allow you to press that##button.##

once the internet knows that we re present and what our intentions might be. For example, a smart home might know

which is in the forefront of making the internet of things#accessible to people other than techies and hobbyists.

##Invisible buttons and other contextual information about you will allow the internet to do more than facilitate your needs.

#Google Now#is a good example of the potential of this technology. As long as you opt in, Google has access to every meaningful store of explicit data about yourself you create##email, contacts, calendars,

social media##and plenty of implicit ones as well, like your web-browsing history.##Adding location and other physical inputs#to that data allows Google Now to do everything from sending youhyperlocal news items targeted to the precise neighborhood in

which you live#to offering information about the television show#you re watching at that exact moment.

So what s required for more companies to tap into anticipatory computing? There are companies that specialize in reality mining,

Wearable computers will connected keep us at all times The next layer of the internet of things will require combining disparate streams of data##mined##from reality##everything from your location to the members of your social network.

##Esri s#Case said at last year s Le Web conference.####If you have to be a data scientist to do it, then it s totally wrong.##

the internet of things will replace the internet, but not by giving us another way to explicitly tell computers what we want.

the internet-connected devices around us will react automatically, and their representations in the cloud will be updated accordingly.

exactly the sort of thing the internet of things would be good At first, our connected devices will be able to monitor our state##inactivity could indicate sickness or depression.

And maybe we ve recently posted on social media about a tragedy that befell us. Text alerts are sent out to friends,

and body with the internet, this is good news . But if you were hoping that in the future,

getting away from it all would be as simple as#switching off your mobile phone, you re in for a rude surprise.


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011