India has been on the cutting edge of technology and emerging trends since the 1990s and they have created a customizable system for other population dense countries looking to rapidly develop to bring the bulk of their population into the new technological revolution.
Since India’s rapid development started in the 1990s it has become the 11th largest economy in the world and has the 4th largest purchasing power parity. It also has approximately 1/6th of the worlds 6 billion+ people, 80% of who are barely accounted for statistically.
The Internet is the fastest and simplest way to communicate to the rest of the world. As I’ve mentioned before, this is a double edged sword. The statements we make online can destroy our business image if we are reckless.
The consequences for not being careful online may be much more serious than we think. In the United States and many other countries, bloggers are now treated as journalists in some regards and can be sued or even prosecuted based on what they say. This article discusses some of the laws that bloggers need to be aware of.
With the recent growth explosion of Quora, I’m pretty sure everyone is following and being followed by lots of other people. Lots of Quora users tweeted about ‘turning off email notifications’ for new followers as there were lots of ‘followings’ happening around.
This would apply to many similar services and so also for Quora. If you follow other people and eventually want people to follow you, please do some homework and complete some basic steps before firing up that ‘follow everyone I know’ button.
Complete your profile. Write a Description. (People need to remember who you are and why they should follow you.)
Upload your picture. An online avatar, be it your own photo or of your cat, is something that people recognize you by.
Answer at-least couple of questions. Or ask some which are relevant to you or your industry.
These are simple steps but it will help people remember who you’re and follow you back to help a meaningful conversation on Quora. It is not easy if you just follow me and I see nothing on your profile (no picture, no questions, no answers). I’m pretty sure other users have the same sentiment.
Quora is a continually improving collection of questions and answers created, edited, and organized by everyone who uses it. The most important thing is to have each question page become the best possible resource for someone who wants to know about the question.
After all the hoopla that WikiLeaks went through along with Julian Assange, the founder of WikiLeaks, it was a wonderment as to what would happen to the online whistle-blowing fraternity. Well, there seems no respite yet for the fraternity cause former deputy to Assange, Daniel Domscheit-Berg along with a few more ex-WikiLeaks employees has launched OpenLeaks which promises to be more transparent, better and bigger than WikiLeaks.
The website will be functional from the summer of 2011, but the site right now is live only with the OpenLeaks logo and he phrase “Coming soon!”. Speaking about the non-proliferation of WikiLeaks and Cryptome on the internet Daniel Domscheit-Berg said “the fear of an immense lack of knowledge and the technical know-how to keep these organizations in operation has lead them to failure.” He also spoke in detail of his project while he was at the 27th Chaos Communication Congress, an annual political and technology conference in Berlin on December 30, to an audience of 300 activists and hackers.
Let me first wish all readers and regular followers of Brajeshwar a very Happy New Year, 2011. 2010 could have been a bad year for many and here is hoping for a better start in 2011. A bad year it was for many at Yahoo! too.
Yes, Yahoo! has done it again. In less than 4 years the company has gone ahead and issued the pink slip to as many as 2,700 employees. History says that the Sunnyvale, California based company had sacked around 1,400 jobs in the year 2008 during the time of recession and then up to 700 job holders were shown the gate in the very next year 2009.
Following this is yet another lot of 600 people who now have to look for other job opportunities. The downsizing saga continued with Yahoo! chopping of 600 jobs during December mid-month of 2010, but the number supposedly higher than the real deal. There were speculations of at least a 20% layoff which in real-time has reduced to a 4% layoff.
2010 might very well have been the year that we dipped further into an Orwellian nightmare as we lost all sense of privacy and dominion. This passing year we have experienced less privacy than ever before with changing Facebook privacy controls and the independence of the press has been obliterated after the persecution of WikiLeaks and Julian Assange. Consider the following main tenets of Orwell’s 1984 in juxtaposition with the major waves in 2010:
Big Brother — Privacy is dead, get over it
Orwell’s concept of Big Brother was an all-seeing eye that watched us constantly, eerily similar to that of Facebook in 2010. This past year Facebook has come under serious scrutiny for changing its privacy constraints, which permeate almost every aspect of our culture. One cannot help but make comparisons between the all-seeing eye of Big Brother and the all-seeing eye of Facebook, both of which dissolve our rights to privacy.
Facebook creator Mark Zuckerberg was even quoted this year saying that “privacy is no longer a social norm,” and that privacy is dead, get used to it. These Big Brother-style comments come at a critical time for privacy issues, as more and more of our lives are brought online. With Facebook’s new searchable parameters, literally everything we do will be online– and at their mercy.
It has always been a practice to think, talk and write about innovative technology that either directly or indirectly has something to do with the world of computing and it always has to be a major news only if stalwarts like Microsoft, Google, or Apple come up with these tech trends. My last article for the year 2010, I wanted to focus on something entirely different. Hence I will highlight on a topic that hovers around on some of the most unique technological trends. These trends were supposedly set to take off during 2010. While we cannot really authenticate their success rate yet, we can surely expect them to pick up in the coming year – 2011. Let us take a look at some of these trends:
1. An online funeral
Till recently online web services such as Otrib and Tributes were used as a platform to pay tribute to loved ones who had passed away. Now this trend has elevated to the level wherein people are actually conducting funerals online using webcasting services through FuneralRecording and FunerAlone. Understandably these kind of events happening online could be frowned upon, but this trend means that people from located anywhere can attend the funeral without actually having to travel.
Be it watching a movie, listening to music, watching television, editing pictures, make records and file them, etc., all this and more is now possible by owning a good laptop – Want to watch a movie? Pop in a DVD. Want to listen to music? Try a CD, or play your MP3 collection or stream music from the Internet. Want to watch television? Stream shows from the Web, or get a digital tuner and get local broadcasts for free. Got a digital camera? Use a laptop to preview your pictures and edit them. You can even make phone calls, with an app called Skype. And to top this off all this is available at a price that is easily affordable even for a middle-class audience – less than $400. A dilemma however is that there is a whole lot of choices to opt from (numerous brands to pick from).
Security organization McAfee has professed that 2011 will see increased attacks on Apple merchandise like the iPhone and iPad, largely due to their in the business sector. McAfee said that Macs had thus far not been often targeted by malicious attackers, because they are not widely deployed.
McAfee cites a major problem of Apple users being unconcerned about malware and other security threats believing that they are secure because no one has attacked them yet. Their report said that the dearth of user understanding regarding exposure on these platforms and the dearth of deployed security options makes for a lucrative landscape for cybercriminals. McAfee said that Mac botnets created by Trojan Horse attacks will increase, as well. Virus and malware may arise as the growth of Apple is calling the attention of hackers, looking to steal sensitive data. Soothsayers have been predicting doom in the mobile arena and while it hasn’t happened yet, it is still only a matter of time.
Continuing from where I left off in my previous article, Tech World’s Top 10 Mistakes – Series I, let us now look at the remaining half of the technology world’s top ten blunders – counting down from number 5 to number 1:
5. IBM PS/2 a little too late
IBM was indeed very late to put to action its pro-active idea of counter-attacking its competitors. IBM’s break-through concept of bringing a computer to every office desk in the world worked very well until competitors like Compaq and others began to hit back during the era of the 3rd generation of the PC market. What the competitors did was they started to fabricate a PC clone of IBM and started to eat away IBM’s PC sales whose prices were, as per business consumers, pretty high and hence they did not mind buying working PCs without the IBM logo on them.
In order to get back into the PC marker groove, IBM gave birth to a new idea and named it PS/2 which was supposedly ‘a completely new PC with a closed micro channel architecture that would force the cloners to start again from scratch’. This could have been fantastic, considering competition would suffer till the time they found a new way to hit back. But the worst part of the entire scenario was that even consumers would have to start from the scratch in terms of getting compatible with the new system. IBM thought that they had enough influence that can pull this idea off. But they were wrong. Another basic mistake that IBM made was the non-realization of the fact that the time for earning more margins on hardware products was long gone and now software is where the real money lies.
4. Iridium hiccup
This should probably be considered as a brilliant technological breakthrough backed by stupid execution tactics. The idea of never having to experience spotty mobile phone coverage and dropped calls surely would be much appreciated and loved by consumers. However, this seems as a dream yet to come true for users, for the team that launched the Iridium satellite went through nightmares to come up with its execution. A mobile network which would cover the entire globe was launched in the year 1998 and nine months post that they had to file for bankruptcy. To achieve the set ambition, they had to actually launch 77 orbital satellites on which the Iridium satellite would rely on. Launching one satellite itself costs loads, so multiplying the loads of cost into 77 would result as quite a large expense. Hence, the bankruptcy. The mission is now seen as a specialist service for remote applications like that of Ocean Vessels and rescue operations.
3. Itanium case
A simple case which focused on engineering optimism and lacked business sense. Intel’s huge investment during early 2000 went into fabricating Intel’s first 64-bit chip. Similar to what IBM did with its PS/2, Intel did with Itanium. Intel did not realize the essence of backing their hardware product with the requisite software application which would enable better deployment and usability of its 64-bit code. This is exactly what competitor AMD did – Operton chip; a chip that combined 32 and 64-bit operations and beat Intel in understanding the exact business trend at that time. Technological business firms are always paralysed by the inability to distinguish between “can we do this?” and “should we do this?”
2. Sony’s ‘deadly’ battery
Now this one is quite different from the already mentioned blunders which either caused user dissatisfaction or created financial losses. Sony apparently developed a battery during 2006/07 which was so deadly that it could have killed users. These battery-packs were made for computer makers like Dell, Apple and Acer and were of lithium-ion make. Once if the computers of laptops were slammed hard on the floor, the battery cells would heat up to the level of creating a small time blast due to a violent combustion. The computers made up of these batteries were recalled and re-fabricated with to ensure there were no dangerous elements in the systems.
1. Intel Pentium Zero processor
One of the most premium inventions that ever took place in the computer hardware-world is Intel’s Pentium processor. But there was a huge blunder that Intel committed and that was a technological flaw supported very well by pathetic engineering and PR planning. During 1994 Intel was doing very well with its Pentium processor earning very good accolades with its astonishing 66MHz clock speeds. But one mathematics professor’s problem with the processor turned out to be disastrous for Intel. He’d installed a few Pentiums in a system being used to enumerate prime numbers, but had been getting very dodgy results back ever since. Intel already knew what the problem was, but chose not to rectify it reasoning that the problem wasn’t an issue unless you were really performing high level mathematical functions. The issue was with the chip’s floating point unit and they presumed they would sort the entire predicament out later. But it was too late too ugly for them.
So there you go, the list of the top ten most obtuse technological blunders made by some of the most renowned technology players in the world.