Facebook; HTC; Windows 10 Privacy; the Cult of Apple

Posted August 13th, 2015 at 3:07 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Facebook Axes Internship for Student Who Exposed Location Flaw

Facebook did not appreciate an app created by enterprising Harvard student Aran Khanna that exploited a privacy flaw in Facebook’s Messenger. The flaw allowed Messenger to automatically share the location of users whenever they chatted. The plugin Khanna created allowed buddies to see their friends’ locations while chatting. Facebook demanded the app be removed. It was, but Khanna still lost his internship.

Cisco Warns Attackers Are Hijacking Critical Networking Gear

Cisco Systems warned customers that hackers are using valid administrator credentials to replace the ROMMON firmware image with a malicious one and subsequently hijack critical network gear. That attackers are using valid credentials indicates they might be insiders or have access to the passwords needed to change Cisco hardware.

HTC Cuts 15 Percent of Workforce Amid Weak Sales

Amid strong competition from Chinese companies like Xiaomi and Huawei, smartphone maker HTC announced a 15 percent slash in its workforce – about 2,000 employees – due to declining revenues. CEO Cher Wang said HTC is realigning to focus on sub-premium smartphone models in markets like India, virtual reality, and wearable technology.

Microsoft Quietly Rewrites Windows 10 Activation Rules

If you are having problems reinstalling Windows 10 because it refuses to acknowledge your product key, ZDNet’s Ed Bott has a very useful entry on how Microsoft’s new approach to software authentication works – or doesn’t.

Even When Told Not to, Windows 10 Still Talks to Microsoft

That means that even if you turn off all of Windows 10’s data-sharing settings – and there are many of them – the operating system still calls home to Redmond. Some traffic is technical, but other communications are raising concerns, such as the information that Windows 10 transmits to a Microsoft server used for the OneDrive cloud service even when users disable OneDrive.

Dropbox Adds USB Security Key Support for 2-Factor Authentication

Dropbox is boosting security with Universal 2nd Factor (U2F) security keys to give users stronger protection. The keys are USB devices that add another layer of verification when accessing the service. Once users type in their passwords, they can then insert the key in the USB port as an alternative to typing the six-digit code.

Twitter Removes 140-character Limit for Direct Messages

Twitter now lets users write direct messages without the 140-character limit. The change, announced Wednesday, will roll out for both Android and iOS platforms, and third-party apps.

Apple: From Fanaticism to Cult-Like Status

Apple has amassed a fanatical following over the years – becoming almost cult-like. Writer Derrick Wlodarz argues that the followers of Apple’s religion are blind believers equipped with a mindset that Apple can do no wrong. All good things end, however, and the writer wonders when Apple’s time will come.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Tech in Ghana; IoT Privacy; Mobile Churn; Lenovo

Posted August 12th, 2015 at 3:06 pm (UTC-5)
1 comment

Today’s Tech Sightings:

Simple Technology Offers Rural Ghana Communities Powerful Communications

In Suke, a remote village in northern Ghana, American entrepreneur Cliff Schmidt and local technologist Andy Bayor have found a way to help communities access services not provided locally. Equipped with Talking Book devices, villagers can access agricultural content, health and social messages for help and advice.

Tech, Retail Firms Propose Privacy Standards for Internet of Things

Following concerns over the sustainable security of always-connected Internet of Things (IoT) devices, the Online Trust Alliance (OTA) released an Internet of Things Trust Framework, which offers guidelines for IoT manufacturers, developers, and retailers to ensure the privacy and security of consumers using the devices.

Study: Faulty Mobile Devices, Transmissions, Poor Customer Care Prompt Major Churn

A new study from Blancco Technology Group, a global provider of mobile-device diagnostics and data-erasure solutions, found that a mix of faulty mobile devices and poor customer care can spur up to 31 percent of respondents to search for a new mobile provider. Up to 33 percent also say they would change to a new brand of mobile device.

Will We Ever Be Ready to Kill Off COBOL?

Believe it or not, 50 years later, COBOL still powers most of the world’s financial transactions and it still is going strong. The programming language, which first appeared in 1959, is used by up to 48 percent of businesses and government organizations. That compares to 41 percent who use JavaScript, 39 percent who use Java, and 26 percent who use C# programming languages.

Lenovo Used Hidden Windows Feature to Prevent Software Deletion

Some users of new Lenovo laptop recently discovered the company has been using a hidden Windows feature to automatically – and covertly – install its software, even when the hard drive is wiped clean. Users who reported this said Lenovo overwrote a system file on every boot, allowing it to download an installer to push its software, even if Windows was installed from a DVD.

Microsoft Launches Remote Desktop Beta for Mac

Microsoft’s redesigned Remote Desktop for Mac lets users access applications and data on other computers. The new version includes a updated design and easier account management.

 

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Sundar Pichai; Alphabet; IoT Security; Microsoft’s Funny AI

Posted August 11th, 2015 at 3:51 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Who Is Sundar Pichai, Google’s New CEO?

Out of the blue, Google announced Monday that it is restructuring. The Google you know will now be a subsidiary lead by a new CEO – Sundar Pichai. The new parent company is called Alphabet. Pichai has been with Google for the past 11 years.

Alphabet’s Most Notable Businesses Besides Google

Under the restructuring plan, Google will continue its search business, along with ads, Android and a host of other areas. But the new entity – Alphabet – will have a host of other businesses ranging from research and self-driving cars to investment and broadband Internet.

Internet of Things Device Security Degrades Over Time

The Online Trust Alliance (OTA), a charitable organization which aims to enhance online trust and empower users, warned that Internet of Things (IoT) devices hitting the market have vulnerabilities that are easy to exploit and manipulate. The OTA said IoT devices must have sustainable security to keep users safe.

Don’t Laugh. Microsoft Teaches Computers to Be Funny

Researchers at Microsoft have developed an artificial intelligence system that can figure out if something is funny or not. The cartoons it was fed had to be described in text because the software struggled with the interpretation of drawings. Researchers hope to come up with a system that actually tells jokes in the future.

Facebook’s Laughable Data Shows ‘LOL’ Isn’t Funny Anymore

A recent report from Facebook looking at how its users express laughter found that those who use “lol” – laughing out loud – are an older demographic than those who use “haha” and “hehe.” For all intents and purposes, it looks like “lol” is headed for retirement.

As Saudi Arabia’s Love of Online Gaming Grows, Developers Bloom

Saudi Arabia is the Middle East’s fastest growing market of online video gamers. In the absence of cinemas and concerts in this conservative society, young people turn to video games for entertainment. In the process, the environment gave a push to local game developers to create local content and characters.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Mobile Extends Reach, Potential of Distance Learning

Posted August 7th, 2015 at 1:50 pm (UTC-5)
5 comments

A student holds a tablet that shows content from distance learning website ALISON.com.  (ALISON)

A student holds a tablet that shows content from distance learning website ALISON.com. (ALISON)

Distance education is increasingly becoming available to mobile users, both as an alternative and a compliment to structured learning. Some educators hope it could even level the global skills gap. But that remains a work in progress.

Open universities that offer MOOCs or Massive Open Online Courses with content from participating universities are not new. But their pace has picked up with increased global Internet connectivity, making it possible for people to learn anything, anywhere, often for free.

For most people around the world, “the first time and actually only time they’ll get on the Internet is with a mobile device – their phone,” said the World Bank’s Michael Trucano, Senior Education & Technology Policy Specialist and Global Lead for Innovation in Education.

As a result, a “tremendous amount of activity” is taking place in this area both in developed and developing countries. And it is taking the idea of leveling the global educational gap out of the realm of dreams and closer to reality.

“It’s coming more quickly, I think, than many people thought,” he added. “It had been a real potential that people had thought about for a long time. And now, we are starting to see that potential become a reality. But it’s messy trying to figure out what works, what doesn’t, what’s affordable, what’s relevant, and what you can do at scale.”

Countries like China have done “some pretty inventive things” with mobile education that wouldn’t typically be applied to PCs, said Trucano. But he said that “requires a different mindset about what’s possible,” which means that “you need to think from the start about appealing to someone on that device and with the use cases that are relevant to them.”

“They may not sit there for an hour and watch a lecture, but they may come in and out in 15-minute spurts,” he noted. “… They may do it over the course of a day or over the course of a week in a way that you wouldn’t consider in a traditional classroom.”

To cater to this demographic, connectivity, its backbones, mobile devices and support mechanisms need to be in place.

“Connectivity, I think, is important when we’re talking about learning types of activities that happen over a specific period of time where it’s not only that you’re connected, but that you have sufficient bandwidth, and that it’s reliable,” he said. “… That has been a real challenge for a number of efforts that we’ve seen.”

A human workforce is also needed to support online learners so that they know how to use their mobile device or receive training to use it for education. Support on the “pedagogical side,” said Trucano, is necessary for students to get feedback if they don’t understand something about the material they are studying.

Then there are issues of cost, funding for the business models used to deliver this type of education, and conducive policy environments.

Not all MOOCs are free. A fee is sometimes required to obtain certification or accreditation for completed work, although that often is “much less than the fee for a course from the university,” said the University of Illinois’s Linda Smith, Dean for Academic Programs at the Graduate School of Library and Information Science.

She cautioned, however, that distance learning portals “are not universities” in the sense that their credentials could be presented as evidence of competence, but “wouldn’t be the same as earning credit toward a degree from a university.”

Mike Feerick, CEO/Founder of ALISON, an Ireland-based global social enterprise dedicated to free, certified education and workplace training, acknowledged that in some cases, master and peer-to-peer learning is essential. But he said the idea of accreditation or traditional recognition “is becoming redundant” because “the one whose opinion counts is the employer, not the third party middlemen [i.e. college].”

A lot of experimentation is going on right now to determine how to award online certificates or badges in ways “that are relevant and useful to the learners they are trying to target all around the world,” said Trucano.

Challenges aside, distance learning, coupled with mobile computing, is having both an evolutionary and revolutionary impact on education. Some changes are incremental, said Trucano, but others are transforming “the conception of what is possible,” addressing problems like teacher shortages, for example.

“Using traditional methods, using traditional institutions … in some cases, it will take decades for countries to be able to train enough teachers,” he said. “And so they have to think about doing it some other way. And this some other way in many cases is to figure out how to use new technologies in new ways and maybe in ways that are consistent with some of the things they’ve done in the past.”

At a minimum, Smith sees distance learning as an opportunity for students to fill their skill and knowledge gaps before progressing to higher education or employment.

“There’s a lot of interest and emphasis on … trying to … make access more universal,” she said. “And so I think that it’s an area that’s moving very rapidly. And it does hold promise for at least addressing some of the differences that we currently have in access to education.”

But rethinking how online educational material – or modules – can be delivered, particularly on smartphones and other mobile devices, is still being figured out.

“The groups that figure that out, I think, will really have a couple of big steps ahead because that device – people have it, they know how to use it, they can afford it, they have it with them all the time,” added Trucano. “And those are all things that are important if you want to reach people with educational opportunities.”

The “biggest challenge holding back this explosion of learning is the low level of wireless connectivity in the [the] developing world,” said Feerick. “But that is changing rapidly. The world will be a different place in that regard in five years’ time.”

Editor’s Note: This post has been updated with a clarification from Mike Feerick to change “accreditation or certificate recognition” to accreditation or traditional recognition.”

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Black Hat; Facebook Personality Dabbling; iPhone Fakes

Posted August 6th, 2015 at 3:49 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Black Hat Keynote Speaker: Dream of Internet Freedom Is Dying

As the annual Black Hat security conference kicked off in Las Vegas, Jennifer Granick, Director of Civil Liberties at the Stanford Center for Internet and Society, warned that overregulation, censorship and bad laws are killing the dream of a free and open Internet.

A participant at the Black Hat 2015 conference has described a way to hack Globalstar satellite transmissions used to track truck fleets and hikers and alter sent messages. The vulnerability could have disastrous repercussions for pilots, shipping lines and all who use the system to monitor remote assets.

A new study from the Pew Research Center found that teens are communicating with each other with text messaging in online games and social networks more frequently than in person. Six in ten said they met at least one new friend online; one-third followed that with a face-to-face meeting. The study found that the lines are blurring between the real and virtual worlds as kids effortlessly straddle both.

Adriel Sumathipala’s grandfather died of a heart attack before Sumanthipala was born. Once the 16-year-old tinkerer learned that his family is at risk for heart disease, he started following a healthier lifestyle. But he was frustrated with the lack of an affordable way to monitor his progress. So he created a low-cost, on-site heart disease test with the help of his biology teacher and an inkjet printer.

Looks like Facebook is still messing around with personality types, albeit in a more roundabout way. A new study published in Personality and Individual Differences found that answering Facebook’s question reveals patterns about users and their goals – seeking attention, staying informed, looking to speak out or communicate. Eventually, a clear personality type emerges.

New research from security firm Imperva found that a “man-in-the-cloud” attack can enable hackers to surreptitiously steal cloud-based files and inject malware. The attack exploits a vulnerability in the design of file synchronization offerings on Google, Box, Microsoft, and Dropbox.

Fake iPhones are part of a big counterfeit-electronics business. And it isn’t just happening in China, where authorities recently seized more than 40,000 counterfeit iPhones. So how do you know if your iPhone is a fake? Writer Wayne Rash offers some tips.

Devices running Google’s Android operating system may be popular, but they do have their challenges. Writer Ryan Whitwam offers a list of do’s and don’ts for Android users to help them make better – and safer – use of their phones.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Privacy; China’s Online Police; OS X; Android Fragmentation

Posted August 5th, 2015 at 3:48 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

‘Right to Be Forgotten’ Online Is Poised to Spread

Europe’s highest court’s ruled more than a year ago that search engines had to give Internet users the “right to be forgotten” to help safeguard privacy. But some privacy and free speech advocates expect the controversial “right to be forgotten” to expand beyond Europe’s borders to the United States and other countries.

Don’t Let a Disability Stop You From Using Your Smartphone

Technology has come a long way in providing tools for the disabled to use computers and digital devices. Writer Edward C. Baig offers some useful tools for disabled people to help them use their smartphones.

The Windows 10 Security Settings You Need to Know

Microsoft’s new operating system comes with a lot of settings for information-sharing. Some of them are not so easy to find. But writer Gordon Gottsegen has some tips to track down and turn off some of those features.

Smartphone Battery Life Is Newest Tool to Invade Privacy

It seems like companies are never at a loss in finding ways to invade consumers’ privacy, with or without their permission. A new study from a group of French and Belgian security researchers found that HTML5′s battery status API, which lets websites help their visitors preserve battery power, can be exploited to spy on the private browsing habits of visitors.

China to Set Up Online Police Stations for Internet Security

China is setting up online police stations to boost Internet security, according to the vice minister of China’s Ministry of Public Security, Chen Zhimin. He told the state-run People’s Daily that the stations are designed to sniff out suspect websites used by criminals and help others stay safe.

Apple Promises Fix for OS X Major Security Flaw

Apple said it will patch a recently-discovered vulnerability in its OS X Yosemite operating system. The zero-day flaw allows hackers to modify a hidden configuration file to get access to the targeted computer and inject it with malware.

There Are Now 24,093 Distinct Android Devices

New research from London-based startup OpenSignal found that there are now more Android devices with far too many different versions of the operating system. Google has been working to limit Android fragmentation, but the latest research shows a consistent increase in Android devices since 2012. Different Android devices shot up 28 percent during 2014-2015, with as many as 1,294 distinct manufacturers now in the Android market.

Hackers Can Remotely Steal Fingerprints From Android Phones

Researchers from security firm FireEye have uncovered new ways that hackers could use to remotely steal fingerprints from Android devices equipped with fingerprint sensors. And the company believes the threat level will increase as more devices come equipped with fingerprint sensors.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

3-D Printed Drug; Mac Thunderstrike 2; Windows 10 Privacy

Posted August 4th, 2015 at 3:17 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

FDA Approves First 3-D Printed Drug

Increasingly, 3-D printing has been leaving its mark in the fields of prosthetics, industrial parts and other areas. Now, Aprecia Pharmaceuticals has announced that the U.S. Federal Drug Administration (FDA) has approved its new 3-D-printed drug, SPRITAM, for the treatment of epilepsy. The company said it is the first 3-D-printed drug to be approved by the FDA.

Internet Experts Submit Plan for US to Cede Control of ICANN

A group of international Internet experts has released a proposal on how the United States can cede control over the Internet Corporation for Assigned Names and Numbers (ICANN). The non-profit group maintains the Internet’s database of top-level domain names.

What You Should Know About Thunderstrike 2 – Mac’s Latest Deadly Firmware

A new proof-of-concept worm called Thunderstrike 2 exploits a security issue in the Thunderbolt ports of Apple MacBooks to write custom code in their boot ROM. This affects peripherals attached to the Macs, such as SSDs and Ethernet adapters. The malware spreads when an infected device is connected to the computer, but the initial attack comes through malicious websites or emails.

Hackers Are Installing Malware on Macbooks

Another problem plaguing Macs allows hackers to exploit a critical vulnerability in Apple’s OS X version 10.10 operating system. The vulnerability, which relates to the way the operating system logs software errors, can let hackers force-install software on the affected Mac.

Windows 10 Silently Uses Your Bandwidth to Send Updates to Others

If you upgraded to Windows 10, you need to know that unless you have tweaked your data-sharing settings, the operating system will share just about everything you do on your computer with Microsoft. On top of that, Windows 10 could be using your Internet connection to send updates to other PCs. But you can turn that feature off too.

The Privacy Settings You Should Check in Windows 10

Windows 10 data-sharing settings are turned on by default in Microsoft’s new operating system. Unless you turn them off, much of your personal data, habits, etc., will be transmitted to Microsoft.

Yahoo Tackles Large Malicious Ad Campaign

Yahoo removed malware from its advertising network after security firm Malwarebytes discovered malicious ads that had been attacking the network since last week. The malware was discovered at ads.yahoo.com, which runs ads on various Yahoo sites and portals.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

People With Disabilities Still an Afterthought in Tech Design

Posted July 31st, 2015 at 1:10 pm (UTC-5)
3 comments

A child uses a Braille machine to type on his iPhone at Camp Abilities in Brockport, New York, June 25, 2013. (Reuters)

A child uses a Braille machine to type on his iPhone at Camp Abilities in Brockport, New York, June 25, 2013. (Reuters)

Progress over the past 25 years has made computing more accessible to people with disabilities. But from design to finish, accessibility is still an afterthought in the race to technological innovation.

Despite breakthroughs in robotics, speech recognition, eye-motion sensors, virtual reality and many other areas, the general design approach to new products still excludes people with disabilities.

Technologies often hit the market quickly because manufacturers are eager to get there ahead of the competition, said Aaron Steinfeld, Associate Research Professor at Carnegie-Mellon University’s Robotics Institute. As a result, “they often view the needs of people with disabilities as something to be addressed in the next version or a second iteration.”

But that might never happen, given rapid technological turnover and the meticulous, labor-intensive process of creating accessible products.

“Every piece of new technology requires that people think carefully about the different ways that people with disabilities both input and get their output from technology, whether it is mobile devices or websites or even virtual reality,” said Larry Goldberg, Director for Accessible Media at Yahoo. “None of it is automatic. Everything needs to be thought about carefully during the design and development process.”

He said cutting-edge technologies, in particular, “need the most attention in terms of inclusive design” because there are new apps, new websites and new services every day.

A visually impaired girl uses the computer at the Royal Academy for the Blind in Amman, Jordan, NOV. 22, 2011. (Reuters)

A visually impaired girl uses the computer at the Royal Academy for the Blind in Amman, Jordan, NOV. 22, 2011. (Reuters)

“If it is designed by people who aren’t aware of the special needs of people who are blind or mobility-impaired, there is a danger that it won’t be designed with every possible user in mind,” he said.

Amid the constant evolution of technology, developers are often too busy to update legacy websites. And they “don’t always follow best practices and guidelines on how to encode accessibility from the beginning,” said Steinfeld.

“Technology then becomes static over time,” he said. “And those websites exist over time. And yet nobody goes back to fix them and improve the accessibility of those systems. So you end up with a large collection of legacy systems that have accessibility problems that nobody is really available to address.”

A lot of progress has been made on the Web, on mobile platforms and in digital publishing to implement accessibility guidelines so that people with a wide range of disabilities are able to use the Internet effectively. But that only works if the content is created in a way that is cognizant of accessibility, said Jeff Bigham of the Human-Computer Interaction Institute at Carnegie-Mellon University.

The technology is there, he said, but part of the problem is convincing people that “creating usable software is vitally important.”

Accessibility is an important design consideration across all areas of technology development, said Judy Brewer of the Massachusetts Institute of Technology (MIT), Director of the Web Accessibility Initiative (WAI) at the World Wide Web Consortium (W3C).

“Newer technologies,” she added, “are increasingly being taken up rapidly in settings that people with disabilities want and need to participate in, such as education, the workplace, healthcare, commerce, social media and entertainment, where it is critical not to exclude people.”

Accommodating limitations in hearing, vision, dexterity, and cognition, for example, can only lead to broader usability and benefit. Neglecting that is a “disservice to the general population,” said Steinfeld.

That means creating technologies that work for everybody, rather than approaching accessibility as a niche market, so that a visually-impaired person, for example, can use Braille on the same websites others use.

“There’s this concept called Universal Design, which says that you should be designing a system to support a wide range of users, including people with disabilities,” said Steinfeld. “But you should do it in a way that has value and impact for the general population so that it becomes something that really has a positive impact on society as a whole rather than being a niche solution for a niche market.

Brewer said work is needed both on the design and product services level and on raising awareness among students, most of whom come into universities with little or no experience with disabled people. Often, they only become aware of the needs of the disabled when they get older or have increased exposure to disabilities.

Macedonian Roza Mojsovska, who suffers from a rare disease that heavily limits the movement of her limbs, works on a computer with a pen in her mouth while moving the mouse with her chin, Bansko, east of the capital Skopje, May 23, 2008. (Reuters)

Macedonian Roza Mojsovska, who suffers from a rare disease that heavily limits the movement of her limbs, works on a computer with a pen in her mouth while moving the mouse with her chin, Bansko, east of the capital Skopje, May 23, 2008. (Reuters)

Universities are producing “too many developers who don’t know about accessibility,” said Bigham, and need to focus more on that area of expertise because ultimately, accessibility isn’t only about technology.

“It’s also fundamentally about people,” he said. “Therefore, we need education programs that train people to be experts in both accessible technology and the people that use them.”

“It’s not in their mindset,” said Steinfeld.

“Being exposed to this in school where there are opportunities to learn and experiment …  means that we’ll hopefully see a greater awareness going out into the workforce,” he said. “And that in turn will hopefully lead to more adoption of best practices.”

Steinfeld believes younger people, especially students, need “a little bit of extra attention so that they are in tune with these issues earlier on in their careers.”

This is why a new collaboration between the tech industry, the disabled community and academic institutions has sprung up.

Goldberg said the Teaching Accessibility initiative, in which Yahoo is a partner, aims “to make sure that students who graduate with degrees in computer science or design or development or human- computer interface get necessary training during higher education so that they emerge from their degree with knowledge and understanding of skills about how to design accessible technology for people with disabilities.”

“People with disabilities do come at every age. Whether you are temporarily disabled or whether you age into it, it’s a broad spectrum,” he said. “So the people we are hiring – yes, they are typically younger – and it’s important that at the very beginning of their careers, that they do understand what these design issues are about.”

It’s a long way ahead, particularly for the visually-impaired. And there are “real barriers still in place in many mainstream experiences.” he said. But he hopes the collaboration will help “narrow the gap for disabled people” so that that there are more successes and fewer failures, in the future.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Facebook; Google Translate; Wearable Tech; Windows 10; e-Sports

Posted July 30th, 2015 at 1:09 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Half of the World’s Population Is on Facebook

Facebook’s daily active users now average 968 million, an increase of 17 percent over last year. According to Facebook, up to 1.49 billion users – half of the world’s online population of three billion – accessed the social network by the end of the second quarter of this year at least once a month.

Google Adds Pollution-Sensing Gear to Street View cars

Google and Aclima, a firm that builds environmental sensors, have teamed up to equip Street View cars with pollution-sniffing hardware. The data will be added to Google Maps to allow users to check for air quality in their area.

Consumers Fret Over Health Wearables Security

Fitness bands and other wearables might be useful, but they siphon user information – an issue that is becoming a concern. A recent survey showed that 25 percent out of 3,500 consumers are not confident that their personal data is safe in the hands of fitness and health trackers.

Windows 10 Questions and Answers

Microsoft’s new operating system, Windows 10, has a lot of new features that you may not know about. ZDNet addresses some of the questions and implications related to upgrading or making the move to this operating system.

How to Disable Windows 10′s Info-Hungry Digital Assistant

Windows 10′s intelligent digital assistant, Cortana, has won the hearts of users, but her help comes at the cost of parting with personal data. Writer Brad Chacos shares some tips about disabling Cortana in Windows 10 and what that entails.

Twitter Finally Has a Decent Windows App

If you are upgrading your computer to Windows 10, you’ll get a new Twitter app that supports multiple photos in tweets, photos in direct messages, and watching various videos from your Twitter timelines.

Google Translate App Now Allows Instant Visual Translations in Hindi

An upgraded version of Google Translate allows instant visual translations of printed text, as in street signs, for example, in Hindi and other languages. The text is instantly translated on the screen to the preferred language without the need for an Internet connection or mobile data.

Pakistani Teen Gets Rich Quick in E-Sports

Moving out of Karachi to Chicago in 2014, the Hassan family of eight crammed in a three-bedroom space, with tight budget and scarce job opportunities. But it took their 15-year old son, Sumail, who played Dota 2 or Defense of the Ancients 2 online, just one month in the U.S. to earn $200,000 as a professional gamer.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Google Takes on Sri Lanka; Home Robots; Windows 10; Hammertoss

Posted July 29th, 2015 at 1:07 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Google’s Internet Balloons Will Provide Connectivity to All of Sri Lanka

Google’s Project Loon and the government of Sri Lanka have just signed an agreement to provide connectivity to the entire country. The island’s IT Minister, Mangala Samaraweera, said the project — using helium balloons to provide Internet access — will connect Internet users at affordable prices.

Japan’s NTT to Put Home Care Robot’s in Homes of  Elderly

Japan’s largest telecommunications firm, NTT, is deploying tiny communication robots in the homes of some of the country’s elderly citizens. The robots, which cost about $800 each, in addition to a monthly service of about $30, interact with wearable devices to help users with health functions, and they can turn home lighting and gadgets on and off.

Microsoft Launches Windows 10 With an Eye on Mobile Market

The new Windows 10 operating system launched Wednesday at midnight. It will be available in 190 countries as a free upgrade for Windows 7 and Windows 8.1 users, as well as for Windows Phone 8.1 users. Microsoft is gambling this approach will help put Windows on more devices and increase revenues.

Russian Hackers Target the cloud, Twitter, GitHub With Hammertoss Malware

A new report from cybersecurity firm FireEye shed more detail on Hammertoss, a backdoor malware strain that uses network traffic noise to spy on corporations. FireEye believes Russian hackers specializing in advanced persistent threat (APT) campaigns developed the malware.

Will the Internet Listen to Your Private Conversations?

Internet of Things (IoT) devices are becoming more prevalent, and in some cases, creeping out privacy-oriented users. Digital assistants like Amazon’s Echo listen to conversations and requests for the weather, for example, as they sit in a home or office. The devices can record, analyze and store the conversations of the unwary.

Windows 10 Wi-Fi Sense: Yes, It Shares Your passkeys – Don’t Be Scared

A new feature that comes with Windows 10 – Wi-Fi Sense – automatically connects a PC to Wi-Fi networks previously used by friends and family. But it will not share Wi-Fi passwords by default with anyone else; and the operating system asks the users if they want to share the password with friends and family.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.