Tag Archive for Mobile

Smartphone Screen Kill Germs

Smartphone Screen Kill GermsCell phones are filthy. I wrote about portable petri dishes back in November 2012. CNET found that 75% of Americans use their mobile phones in the bathroom to make calls, text, and play with apps. Your mobile phone carries more germs than a toilet seat. There is speculation that they have even spread Ebola. Now, thankfully, Corning has your back.

Gorilla Glass kills germs all by itselfEric Limernewest revision of Gorilla Glass is more resilient and kills pesky germs all by itself. Gorilla Glass covers 1.5 billion mobile phones worldwide, including all Apple (AAPL) iPhones.

Corning discussed its upcoming display tech at the MIT Mobile Technology Summit. The antimicrobial coating on the new glass can kill virtually all nasty microbes on the screen’s surface over a course of two hours. It’s not instantaneous, but it’s way better than having a pocket petri dish, Mr. Limer observed.

Signe Brewster at GigaOM wrote that during the presentation, Corning senior vice president Jeff Evenson reported that the company is working on glass that kills viruses and germs — even the drug-resistant variety. GigaOM says that the VP noted a study that found smartphones carry more microbes than the average public toilet. He displayed how the glass kills microbes over time with slides depicting them as bright green dots. After two hours, the antimicrobial glass had a million times fewer bacteria than standard phone glass. Corning’s Evenson said

“You’re eating your sandwich at your desk. Your smartphone rings. You answer it. You complete the call, put your smartphone down and you go back to eating your sandwich with the same hand. Which piece of glass do you want on that device?”

Gizmodo reports that Corning said the antimicrobial displays will be available sometime in the next two years.

Corning antimicrobial glass kills germs

And that’s not all, either. GigaOM’s Brewster also reports that Corning is developing a new transparency treatment that will make the next revision of Gorilla Glass tens of times more transparent than purified water. This should result in seeing your phone in broad daylight is about to get way easier.

 rb-

Until Corning releases Gorilla Glass 3, washing your hands is a good idea, and licking your iPhone screen is probably a bad idea. In order to clean your iPhone, Apple recommends:

Wash your handsTo clean iPhone, unplug all cables and turn off iPhone (press and hold the Sleep/Wake button, and then slide the onscreen slider). Use a soft, slightly damp, lint-free cloth. Avoid getting moisture in openings. Don’t use window cleaners, household cleaners, aerosol sprays, solvents, alcohol, ammonia, or abrasives to clean your iPhone. The front and back glass surfaces have an oleophobic coating. Simply wipe these surfaces with a soft, lint-free cloth to remove fingerprints. This coating’s ability to repel oil will diminish over time with normal usage, and rubbing the screen with an abrasive material will further diminish its effect and may scratch the glass.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

OMG Texting bday

OMG Texting bday20 years ago this week, one of the largest phenomenons of web 2.0 emerged. On December 3rd, 1992, a 22-year-old Canadian test engineer sat down and typed out a very simple message, “Merry Christmas.” Gizmodo says the text flew over the Vodafone (VOD) network to the phone of Richard Jarvis, and since then, we just haven’t been able to stop texting.

Texting is a major staple of communication now,Texting is a major staple of communication now, and by far the main use of a phone for many, but it didn’t start out that way. In the very beginning, texts were just a way to send network notifications, namely to let you know you had a voice mail. In 1993, Nokia (NOK) became the first company to make GSM handsets capable of person-to-person texting, but it still didn’t skyrocket to popularity for several years.

Growth of texting

ComputerWorld reports that in late 1995, three years after Papworth’s first text message, users were only sending an average of one text every two and a half months. In 2000 the industry counted 17 billion text messages, according to data from Ericsson. In 2010, the world sent over 6.1 trillion SMS messages or roughly 193,000 per second.

POTUS TextsToday, upwards of 7 trillion text messages are sent every year—that’s more than 200,000 per second.  So while you’re launching your daily flurry of textuals, take a second to consider the fact that your inane contributions are part of zeta-flood of data.

Digital Trends claims that texting is becoming obsolete. They cite data from Chetan Sharma, an independent mobile analyst and wireless carrier consultant, who reports that the number of text message exchanges in the U.S. had dropped by about 2 percent in the third quarter. This is a sharp difference from the steady growth that text messaging had previously seen. Sharma says it’s the first time that text messaging has begun to dwindle in the United States.

rb-

Texting is still a huge part of the way people communicate via mobile devices, but the emergence of new messaging options has led to the first decline in SMS volume.

Apple‘s (AAPLiMessage, which operates almost Texting is becoming obsoleteexactly like a text message but only communicates between Apple devices. iMessage completely bypasses the carrier when sending text messages between iPhones.

Facebook‘s (FB) Messenger app, which essentially exists as the mobile presence for the social network’s instant messaging feature. Facebook’s Messenger app can be used across multiple platforms, which could give it an advantage when it comes to text messaging alternatives.

Hopefully, the competition will force AT&T (T) to stop overcharging its customer. Gizmodo claims AT&T’s New Text Plan Overcharges You by 10,000,000 Percent. Literally lead the way toward cheaper texting plans.

The history of SMS

Related articles
  • Text messages direct to your contact lens (telegraph.co.uk)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Bill Ford Wants to Turn Michigan into “Silicon Valley of Mobility”

Bill Ford Wants to Turn Michigan into “Silicon Valley of Mobility” Ford Motor Company (F) Executive Chairman Bill Ford Jr. believes Detroit and Michigan can shed their rust belt persona. In a speech during the annual Mackinac Policy Conference, on Mackinaw Island, Mr. Ford said the Motor City can shed its rust-belt image and take on high-tech communities like San Francisco, Palo Alto, California, or Seattle. The Ford Chairman contends Michigan can be repositioned as the “Silicon Valley of Mobility.”

Ford logoThe Detroit Bureau observes this is a matter of been-there-done-that. In its heyday, in the early years of the 20th Century, Detroit was the quintessential American boomtown, much like Silicon Valley is today. It was dubbed by many the “Paris of the Midwest” because of its art, architecture, and sophisticated lifestyle. But things began to rapidly decline in the post-War years and today some old industrial sites are being converted back to farmland.

Chairman Ford insisted continuing decline is not inevitable, especially if Detroit and Michigan embrace new “green, smart technologies.” Mr. Ford continued, “To address this issue, we will once again need new technologies, as well as new ways of looking at the world. We will need to view the automobile as one element of a transportation ecosystem.

DetroitThe automobile, Bill Ford has noted on several occasions, can no longer be viewed as a standalone machine. Industry leaders need to accept and respond to such challenges as fuel economy, emissions, safety, and highway gridlock.

Bill Ford – Ford Motor Company Chairman

This technology is in varying stages of development and deployment, but it promises to radically transform the experience of driving,” said Ford during his speech. “As it develops, I believe Michigan must become the Silicon Valley of the mobility revolution.

The Ford Chairman noted the automaker has so far invested nearly a billion dollars in battery technology in Michigan. That includes upgrades to the Michigan Assembly Plant in the Detroit suburb of Wayne that recently began producing the new Ford Focus Electric. The factory will also add a plug-in hybrid version of Ford’s new C-Max “people-mover” later this year.

As TheDetroitBureau.com recently reported, there has been a significant turnaround in terms of high-tech job opportunities in Michigan. According to the Society of Automotive Engineers and other groups, there is now a shortage of trained specialists, especially with more advanced skills in areas such as fuel economy and emissions controls. And Detroit’s Big Three aren’t the only ones hiring. Virtually every major automaker and supplier now has a significant tech presence in Metro Detroit, including Toyota which has set up a major test track and engineering center near Ann Arbor.

In his speech, Chairman Ford noted a recent study by TechAmerica Foundation (which I also noted here) that found that despite the deep recession Michigan had added more high-tech jobs in 2009 and 2010 than any other state.

The turnaround of the Great Lakes State will require a significant effort, the Ford Chairman acknowledged and will take steps that make sure its competitiveness according to the article. He concluded his speech by calling on lawmakers to take several steps, including the elimination of personal property taxes and investment in upgrading the electrical grid – which many see as a significant impediment to both expanded industrialization and the growth of the electric vehicle market.

“We can keep this momentum going if we are frank about the areas in which we can improve and we build upon our advantages,” Ford added.

rb-

I think there are more fundamental problems that Michigan is going to have to solve before it can take on Silicon Valley. The labor supply pool in Michigan is very thin even for the most basic IT positions like field technicians. Where I am working now, it is a constant struggle to find staff that have some enterprise experience and people skills. I think that anybody with some good skills is either working or has left Michigan.

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

How Does Your Equipment Stack Up?

How Does Your Equipment Stack Up?Engadget points us to phone-size.com that lets you compare the relative proportions of different smartphones. At the top of the webpage, you’ll also find a toolbar to enter the size and aspect ratio of your display. Once you jump through this minor hoop, according to Engadget, the utility produces accurate, life-size depictions of smartphones like Apple’s (AAPL) iPhonesGoogle’s (GOOG) Androids, and Research In Motion’s (RIMM) Blackberrys.

rb-

Really wanted to use the title.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

McAfee Labs 2012 Threat Predictions

McAfee Labs 2012 Threat PredictionsComputer security company McAfee unveiled its Threat Predictions report (PDF), outlining the top cybersecurity threats organizations and individuals are likely to face in 2012. McAfee, a wholly-owned subsidiary of Intel (INTC), says that for the most part, 2012 looks like it will look like 2011 only worse, with many of the recent threats gaining momentum. Here are the predictions:

Industrial Attacks:Industrial Attacks: Cyber-criminals will target Water, electricity, oil, and gas utilities. These are essential services to everyday lives, yet many industrial systems are not ready for cyber-attacks according to McAfee. Many of the environments where SCADA (supervisory control and data acquisition) systems are deployed don’t have stringent security practices. McAfee predicts attackers will leverage this lack of preparedness with greater frequency, if only for blackmail or extortion in 2012.

Legalized Spam: McAfee Labs says global spam volumes have declined in the past two years. However, legitimate advertisers are picking up where the spammers left off using the same spamming techniques, such as purchasing third-party email lists or databases from companies going out of business. McAfee Labs expects to see this “legal” spam and the technique known as “snowshoe spamming” continue to grow at a faster rate than illegal phishing and confidence scams.

Mobile ThreatsMobile Threats: 2011 has seen the largest levels in mobile malware history, McAfee Labs expects that continue in 2012. They expect mobile attackers to improve on their skill set and move toward mobile banking attacks. Techniques previously dedicated for online banking, such as stealing from victims while they are still logged on while making it seem that transactions are coming from the legitimate user, will now target mobile banking users. McAfee Labs expects attackers will bypass PCs and go straight after mobile banking apps, as more and more users handle their finances on mobile devices.

Embedded Hardware: Embedded systems are designed for a specific control function within a larger system, and are commonly used in automotive, medical devices, GPS devices, routers, digital cameras, and printers. McAfee Labs expects to see proofs-of-concept codes exploiting embedded systems to become more effective in 2012 and beyond. This will require malware that attacks at the hardware layer and will enable attacks to gain greater control and keep up long-term access to the system and its data. Sophisticated hackers will then have complete control over hardware.

countries prove their cyber war capabilitiesCyberwar: Countries are vulnerable due to massive dependence on computer systems and a cyber-defense that primarily defends only government and military networks. Many countries realize the crippling potential of cyber attacks against critical infrastructures, such as water, gas, and power, and how difficult it is to defend against them. McAfee Labs expects to see countries prove their cyberwar capabilities in 2012, to send a message.

Rogue Certificates: Organizations and individuals tend to trust digitally signed certificates, however, recent threats such as Stuxnet and Duqu used rogue certificates to evade detection. McAfee Labs expects to see the production and circulation of fake rogue certificates increase in 2012. Wide-scale targeting of certificate authorities and the broader use of fraudulent digital certificates will affect key infrastructure, secure browsing and transactions as well as host-based technologies such as whitelisting and application control.

Legislative IssuesLegislative Issues: DNSSEC (Domain Name System Security Extensions) is designed to protect a client computer from inadvertently communicating with a host as a result of a man-in-the-middle attack. Governing bodies around the globe are taking a greater interest in establishing “rules of the road” for Internet traffic, and McAfee Labs expects to see more and more instances where legislative issues hamper future solutions.

Hacktivism: McAfee Labs predicts that in 2012 digital disruptions like Anonymous will join forces with physical demonstrators and will target public figures such as politicians, industry leaders, judges, and law enforcement, more than ever before.

Virtual CurrencyVirtual Currency: McAfee Labs expects cryptocurrency will be an attractive target for cybercriminals.  to see threats evolve to steal money from unsuspecting victims or to spread malware.

Hardware Attacks: McAfee Labs expects to see more effort put into hardware and firmware exploits to create persistent malware in network cards, hard drives, and even system BIOS (Basic Input Output System). and their related real-world attacks through 2012.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.