Virtual Warsaw; IBM’s Power Chip; Sexism in Games; Windows 10

Posted July 9th, 2015 at 3:33 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

How the Blind Led Warsaw to Internet of Things

A project that started in Warsaw, Poland, a few years ago to help the visually impaired get around the city has taken on new life. The service, which provided an app that gave real-time traffic and navigation information based on the user’s location, is now a beacon-based urban navigation system called Virtual Warsaw.

Deepening Tech Dependency Raises Risk of Breakdowns

Computer outages that paralyzed United Airlines, the New York Stock Exchange and The Wall Street Journal Wednesday have sounded the alarm on human dependency on technology. Humans are unable to cope with the speed of the technological progress they created, especially as their computer systems become increasingly complex and interconnected.

IBM Unveils Most Powerful Chip Ever Created

A new, powerful chip that uses transistors three times wider than a DNA strand could be in computers within a couple of years. The creator, IBM, said the chip, which has four times the power of the best silicon chip currently available, was made possible by using silicon-germanium in the manufacturing process.

Survey Shows Boys Are Aware of Sexism in Games

A recent study by Time found that boys don’t care whether the protagonist in a video game is male or female, and they are quite aware that women are underrepresented. About 58 percent of male gamers said there should be more female protagonists, while 70 percent of surveyed girls said the gender of the protagonist does not factor in playing a game.

Windows 10 Could Have Serious Wi-Fi Vulnerability

Arriving toward the end of July, Windows 10 comes with Wi-Fi Sense, a feature designed to connect Windows Phone automatically to open networks it detects. But security firm AVG warns that automatically connecting to unsecured Wi-Fi networks and accepting their terms by default is a bad idea.

Mozilla Patches Critical Vulnerabilities in Firefox Update

Firefox maker Mozilla has released a new update to its browser that fixes four critical vulnerabilities, among other issues. Users are advised to update their Firefox browsers to the latest version.

Facebook Tweaks Its News Feed – Again

The latest update to Facebook’s News Feed lets users choose which friends and brands they’d like to see first on their pages. The changes are part of revamped preference controls that will roll out on Android and iOS devices in the next few weeks.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

China’s Privacy Law; Gender on Facebook, Google; Mobile Addiction

Posted July 8th, 2015 at 3:32 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

China’s Draft Cybersecurity Law Could Boost Censorship

A draft cybersecurity law just published by China’s parliament boosts privacy protection from hackers and information peddlers, but strengthens government powers to obtain records and block information that might be deemed illegal under Chinese law. The move could have significant implications for Internet service providers and multinational companies in China.

Study: Women Less Likely to Be Shown Ads for High-Paid Jobs on Google

Researchers from Carnegie Mellon who built an automated testing rig called AdFisher found that Google is less likely to show female job seekers ads for highly paid jobs. The researchers, who pretended to be male and female job seekers, found that men were more likely than women to see advertisements encouraging them to seek coaching for high paying jobs.

Facebook Creates Men, Women as Equals

Facebook has redesigned some of its social media icons in what appears to be a move to promote gender equality. In previous designs of its Friends and Groups icons, female silhouettes appeared in the shadow of male silhouettes. The new Friends design puts men and women side by side. The Groups icon redesign moves the female icon to the forefront.

Microsoft Writes Off $7.6 Billion From Nokia Deal, Cuts 7,800 Jobs

Microsoft is slashing 7,800 jobs, mostly in its phone business, and writing off the $7.6 billion it incurred when it acquired Nokia’s phone business. The company recently warned that it would have to make to some tough choices as it restructures some of its departments.

Cybercriminals Use Flash Zero-Day Exploit From Hacking Team Breach

An Adobe Flash Player exploit discovered Tuesday in a dump of files stolen from the Hacking Team, an Italian firm that provides surveillance tools to governments and law enforcement agencies, has fallen into hackers’ hands. Adobe Systems said a patch will be released today.

Apple, Facebook,Twitter Hackers Identified

Symantec Internet security researchers have uncovered the identity of the hackers who exploited a Java zero-day flaw to target staff at Silicon Valley firms in 2013. The attacks by a group calling itself “Morpho” were not announced at the time, and forced a security lockdown at Apple, Facebook and Twitter.

How to Use Your Smartphone Less, Be Happier

Are you a smartphone addict? If the answer is yes, writer Chris Plante has 10 steps for you to help you kick the habit and lead a happier life.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

AI Demons; the Solar Race; Bitcoin; Cybersecurity; Firefox

Posted July 7th, 2015 at 4:16 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Five Ideas to End the Demonization of Artificial Intelligence

The Future of Life Institute recently announced 37 winners of research grants in the field of Artificial Intelligence (AI), following concerns and warnings from luminaries such as Elon Musk, Stephen Hawking and Bill Gates about the dangers of Artificial Intelligence. The project is part of a bigger effort to prevent AI from running amok.

Sunniest Continent Lures Tesla as Solar Battery Race Accelerates

That title goes to Australia, a world leader in solar panels to power homes. Now, the Sunniest Continent is hoping to attract solar battery suppliers from Tesla Motors seeking battery storage – an emerging market – which will allow solar-powered homes to store excess energy for later use.

Japan to Offer Free Wi-Fi Atop Its Highest Mountain

Several prefectural governments and Japan’s NTT Docomo, one of the country’s leading wireless carriers, have teamed up to launch free Wi-Fi on Mount Fuji on July 10. The move coincides with the start of the mountain’s climbing season and finally will provide connectivity to visitors.

Bitcoin’s Value Isn’t Currency, It’s Technology

Writer Robert Rosenkranz argues that digital currency Bitcoin has successfully ensured anonymity to dealers and enabled transactions without third-party guarantors, but that its biggest problem is the lack of market value.

Bitcoin Hit With Double-Spending Bug

Bitcoin has had its share of problems, including numerous hack attacks that have cost users millions of dollars. Now, a new problem – a double-spending bug – has cropped up. The bug, the result of a planned upgrade, makes it possible to spend the same bitcoins twice. The Bitcoin Foundation said all transactions confirmed by 15:00 on July 4 are safe.

Firm That Sells Surveillance Software Gets Hacked

The Hacking Team, an Italian company that sells surveillance tools and vulnerability exploits to governments and law enforcement agencies, was hacked over the weekend. Security researchers said up to 400 gigabytes of corporate communications have been dumped online as a result of the attack.

Unpatched Flash Exploits Unveiled in Hacking Team Data Dump

The ironic hacking of the Hacking Team firm also has exposed unpatched Adobe Flash glitches, according to Trend Micro security researchers. After analyzing the hackers’ data dump, researchers said there are at least three exploits that target Adobe Flash Player and the Windows operating system. Some of these already have been patched.

Big Changes Coming to Firefox

Mozilla has announced some serious changes to its Internet browser, Firefox, which will focus on private browsing. The changes could include a move away from the XBL markup language and XUL interface, though it remains unclear if that will be replaced with open Web technologies.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Using Biometrics to Track India’s Tuberculosis Cases

Posted July 3rd, 2015 at 2:15 pm (UTC-5)
1 comment

Biometrics might be the future of security in cyberspace, but in India, a non-profit is using the technology to help health workers fight tuberculosis (TB).

Operation ASHA, a group dedicated to bringing tuberculosis treatment and health services to India’s urban slums and rural villages, has adopted biometrics to ensure that TB patients receive full treatment and to detect any new cases.

To accomplish this, the group uses an array of tools called eCompliance, eDetection and Lab Alert System.

“TB patients are hidden in darkness, partly due to their own fears of death and disease, and partly due to fear of discrimination” – Dr. Shelly Batra

Operation ASHA President and Co-Founder Shelly Batra, MD, explained how all this works in an email interview.

Q. How does eCompliance work?

BATRA: TB patients must take up to 76 doses of medicines under direct observation. Patients must visit a designated treatment center for this. This poses a challenge for all stakeholders – the patient, health workers and supervisors – due to [the] long six-month time period involved.

… Operation ASHAs centers are based deep in disadvantaged areas, and open at convenient times so no one has to miss work and wages .eCompliance was developed to further ensure every dose [is] taken at these centers, and for tracking patients who miss their dose.

A tuberculosis patient scans his fingerprint into Operation ASHA's system to register his clinical visit and compliance with required treatments. (Prateek Ahuja)

A tuberculosis patient scans his fingerprint into Operation ASHA’s system to register his clinical visit and compliance with required treatments. (Prateek Ahuja)

eCompliance software is loaded on a 7” tablet, which has a SIM card. This connects the tablet to a central server through internet or text messages … The tablet connects externally with a biometric finger printing device.

… Once a patient is diagnosed with TB, his fingerprints are registered in the system alongside his other details. Thereafter, every time the patient takes the medication, he has to give his fingerprints at the TB treatment center. This generates irrevocable evidence that the visit took place, every time, and the medicine was taken under observation.

If a dose is missed, eCompliance issues an alert to the patient, health worker and his supervisor. The health worker has to meet the patient within 24-48 hours, provide further counseling, deliver the dose and ensure that the patient re-joins the therapy … This helps achieve a very high adherence and treatment success rate.

Q. When did you start using this tool?

We piloted eCompliance in Delhi, India, in 2009 and have now scaled to most of our centers in India in nine states.

It has already recorded over 450,000 transactions with a treatment completion rate of almost 90 percent and an extremely low default rate of below three percent.

In Cambodia, we are serving 10 percent of all TB patients and the population … eCompliance has been replicated in Uganda and the Dominican Republic, and now in Peru by third parties. In Afghanistan, we are collaborating with a local NGO who wants to learn and implement eCompliance and have already received funds for doing this knowledge exchange and buying hardware.

Q. What is eDetection?

BATRA: Due to the high proportion of ‘missed cases’ of TB, OpAsha introduced eDetection to its technology suite. It is used to scale up detection of these unidentified and hidden patients in hard to reach geographies, where delivery of government healthcare system is fractured. It is also used to screen contacts of existing patients. TB patients are hidden in darkness, partly due to their own fears of death and disease, and partly due to fear of discrimination.

… OpAsha’s community health workers … use eDetection to educate the community on symptoms of TB, administer an algorithm-based questionnaire, and subsequently facilitate sputum testing and diagnosis of suspects based on the responses to the questionnaire. Thus use of eDetection ensures early screening and identification of TB patients, enrolling them for treatment and also reducing the spread of infection to other individuals.

… Results from our pilot study in Cambodia show a substantial increase in identifying symptomatics and a 20 percent increase in detection rates of TB patients in comparison to manual detection, as compared to data during the same period in the previous year. There is a 20 percent Improved detection, 20 percent improvement in productivity, and 20 percent reduction in costs.

Q. How does the Lab Alert System work?

BATRA: This is simply a system where manual lab registers are replaced with electronic ones … End-Users [mainly lab technicians] enter contact details of patients along with [their] lab result … So whenever a patient tests positive for TB, an SMS gateway sends text messages to the concerned health worker, who follows up with the patient, carries out intensive counseling and ensures that the patient is promptly enrolled for treatment.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Laser Internet; Android Malware; Windows 10; Mobile Addiction

Posted July 2nd, 2015 at 3:14 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Facebook Works to Deliver High Speed Internet Using Laser

Facebook founder and CEO Mark Zuckerberg said on his social media page that Facebook’s Connectivity Lab is developing a laser communication system that can beam data via drones and satellites, thereby providing Internet connectivity at much higher speeds.

New Android Malware Is Sprouting Like Weeds

A report from G Data Security Labs finds information stored on Android devices to be vulnerable to as many as 4,900 new malware files each day. Increasingly a profitable platform for hackers, the Android operating system is likely to attract more than 2 million new strains of malware this year, according to the company.

Poll: More Americans Reach for Phone Than Partner in Morning

A new poll conducted by Braun Research for Bank of America of about 1,000 participants finds that 35 percent of surveyed millennials reach for their phones first thing in the morning, rather than their partners. Forty-four percent fall asleep with their smartphones in hand, and three percent go to bed with their smartphones.

Microsoft Offers More Details About Windows 10 Rollout Plan

Microsoft’s new operating system, Windows 10, will start rolling out on July 29 for Windows Insider participants. After that, users who accepted the invitation to upgrade their Windows systems will start getting notifications. The upgrade process will alert users if their systems are not ready for Windows 10 and offer alternatives.

What Awaits Twitter’s Incoming Interim CEO Jack Dorsey

Twitter co-founder Jack Dorsey is taking the helm of the social media giant, temporarily replacing CEO Dick Costolo. Dorsey will focus on making the leadership transition as seamless as possible while the company’s board of directors searches for a permanent CEO.

The 7 Greatest Pivots in Tech History

If you didn’t know, YouTube was a dating site at one point, and Twitter used to be called Odeo. Here’s a look at some of Silicon Valley’s most successful companies that – more or less – had dubious beginnings.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Leap Second; India’s Digital Age; Zuckerberg on Telepathy

Posted July 1st, 2015 at 3:01 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Leap second Causes Internet Hiccup Overnight

Don’t say you weren’t warned. The infamous leap second – that extra second added to sync world clocks with the Earth’s rotation – crashed about 2,000 networks just after midnight Coordinated Universal Time (UTC), half of them in Brazil. Most networks recovered after rebooting their routers.

After WiFi at Taj, Modi Revives ‘Digital’ India Campaign

India’s Prime Minister Narendra Modi is reviving an $18-billion campaign to connect 250,000 villages to the Internet by 2019. The plan aims to bridge the country’s digital gap and increase investment in technology manufacturing

India Will Pass US to Become World’s Second Largest Smartphone Market

A new report from Strategy Analytics expects India to become the world’s second-largest smartphone market by 2017. That will push the United States to third place. Right now, China sits in the top spot. Strategy Analytics Director Linda Sui predicts Indians will buy up to 118 million smartphones in 2015, and as many as 174 million in 2017.

Zuckerberg: Future of Facebook Is Telepathy

Facebook founder and CEO Mark Zuckerberg said one day, people will be able to exchange thoughts telepathically, without the aid of technology. With the advent of immersive technologies like Virtual Reality, Zuckerberg said people will have the power to share full sensory and emotional experiences with others.

Researchers Expose Dino, Espionage Malware With French Connection

ESET security researchers in Slovakia have uncovered what looks like another state-sponsored espionage tool that targets computers in Iran, among other countries. Built in a modular, backdoor fashion, the malware – named “Dino” – could have been developed in France by the Animal Farm espionage group, which created “Casper,” “Bunny” and “Babar” malware.

From Robots, Emails to Handwritten Letters: Using Tech to Reverse Tech

Remember when you used to write letters to friends and family? Thoughtful and meticulous? Email, instant messaging and various other tech advances have virtually killed personal letter writing. Now, Snail Mail My Email, a global art project, and companies like Bond are trying to revive that lost art. Snail Mail My Email’s community of volunteers handwrites strangers’ emails, and also has  written and sent more than 23,500 letters around the world.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Leap Second; 3-D-Printed Building; VPN Leaks; Apple Price Fixing

Posted June 30th, 2015 at 3:20 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

The Leap Second Is Coming to Confuse the Internet Today

It’s June 30; and that could be a problem. Just before midnight in London tomorrow, the world’s atomic clocks will gain a second before reverting back to 00:00:00. The extra leap second is needed to keep the clocks synced with the Earth’s rotation, although the last time this happened, it crashed a whole host of unwary websites.

Creating a Tech Hub in Gaza

Gaza Sky Geeks is a startup “accelerator” in Gaza City that helps develop business ideas and connect entrepreneurs with investors. U.S. charity Mercy Corps runs the project with backing from Google. Californian Iliana Montauk, who started Gaza Sky Geeks, hopes to harness the power of Gaza’s young population to create tech success stories.

The ‘Father of SMS,’ Matti Makkonen, Dies at 63

Finnish pioneer Matti Makkonen, widely considered the “father of SMS” for co-inventing and pioneering the idea of text messaging in 1984, died of illness at the age of 63. While messaging apps are beginning to take over, SMS messaging, which revolutionized communications at the time, remains widely used.

Dubai Plans to Build 3D Printed Office Building

The United Arab Emirates announced that Dubai soon will use 3D printing to create a new office building as part of a larger project to make the Gulf state a hub for technological innovation and 3D printing.

VPNs Are Now Leaking User Information

A recent study that researched 14 popular Virtual Private Networks (VPNs) found that at least 11 have a vulnerability known as the IPv6 leakage, which leaks user information, including website traffic data and forum comments.

Bitcoin-Inspired ‘Enigma’ Lets Computers Mine Encrypted Data

Following Bitcoin’s example, a couple of entrepreneurs and the Massachusetts Institute of Technology (MIT) Media Lab have come up with a prototype for a system called Enigma that facilitates the sharing of encrypted data without decrypting it. Enigma uses “homomorphic encryption,” which mimics some of Bitcoin’s decentralized architecture, encrypting data by splitting it up and distributing it throughout its networks until the user puts it back together and decrypts it.

MIT Develops Donor ‘Transplants’ for Buggy Code

Researchers at MIT have come up with a system called “Automatic error elimination by horizontal code transfer across multiple applications” to reduce errors in open-source programs. The system automatically transfers code from donor programs to buggy applications to eliminate mistakes.

US Appeals Court: Apple Conspired to Fix E-book Prices

A divided U.S. federal appeals court ruled Tuesday that Apple violated anti-trust laws by conspiring with five publishers to raise e-book prices. The 2-1-vote ruling said the tech giant ensured that market-wide prices rose to the level dictated by Apple and the publishers.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Beware the Mixed Blessings of Mobile Health, Medical Apps

Posted June 26th, 2015 at 3:48 pm (UTC-5)
2 comments

A woman undergoes an eye examination using of a smartphone at a temporary clinic by International Center for Eye Health at Olenguruone in the Mau Summit, west of Kenya's capital Nairobi, Oct. 29, 2013. (Reuters)

A woman undergoes an eye examination using of a smartphone at a temporary clinic by International Center for Eye Health at Olenguruone in the Mau Summit, west of Kenya’s capital Nairobi, Oct. 29, 2013. (Reuters)

Health and medical apps are becoming part of daily life. They track fitness, provide useful health indicators, and even create new health care opportunities in developing countries. But despite their promise, unregulated apps are raising concerns about safety as well as the security of patient data.

While health and medical apps can be useful, Kevin Pho, MD, co-author of Establishing, Managing, and Protecting Your Online Reputation: A Social Media Guide for Physicians and Medical Practices advised consumers to approach them with caution.

“They are often not regulated by any scientific body; and health app makers sometimes don’t have physician expertise to back up their claims,” he said in an email interview.

In some cases, apps that boasted diagnostic features turned out to be fraudulent.

“The IMS Institute for Healthcare Informatics found that fewer than 25 percent offered patients legitimate medical information,” said Pho. “Apps that claim to diagnose – such as those that say they diagnose skin cancer – were found to miss cancer 30 percent of the time.”

He said apps that are vetted and recommended by a physician are likely to be safe. But he advised patients to work with their doctors “to ensure the safety and efficacy of any health app they use.”

That also depends on what the application is for, said Morgan Reed, Executive Director of ACT | The App Association, in an interview. Physicians are always eager to see their patients take better care of their health, if that is what the app encourages them to do.

“There are those kinds of applications that I don’t think are necessarily ones that you have to consult your physician first,” he said. “But if you are using a mobile app to help you increase your exercise and you are unsure if that exercise is appropriate for you, then absolutely you should consult with a physician first.”

Apps that provide medically-actionable information should be used in consultation with a physician and regulated, said Eric Topol, MD, Director of the Scripps Translational Science Institute and Chief Academic Officer, Scripps Health. “There has to be oversight,” he said.

“You don’t want to give insulin for the wrong glucose,” he said. “You don’t want to give blood pressure medications for high blood pressure when it’s actually low.”

Medical apps are already embedded in some hospitals. And Reed, who pointed out that some are used to monitor vital signs as patients are ferried to the hospital, sees great promise in remote-monitoring apps, particularly for keeping an eye on the disabled and the elderly.

These apps also provide a viable option in regions where health care systems are struggling to cope, or in rural areas where doctors are in short supply. And their biggest impact there will likely be due to what Topol described as their “leveling effect.”

“I call it “flattening the earth,” he said, “because this works just as well and it is a leapfrog for people in developing countries.”

The information the apps provide creates “more parity,” he said, allowing people in those regions to “have the same medicine – at least on the diagnostic side and the monitoring side – anywhere in the world just because wherever there is a mobile signal, there is a capacity to render better health care.”

But that collected treasure trove of information can be a double-edged sword, particularly where mobile technology has outpaced consumer protection laws. And the privacy and security of patient information are a major concern for Topol, author of The Patient Will See You Now.

“That’s center stage right now,” he said, “because …  there is no protection about that data. And … unknowingly, unwittingly, that data is being used by others without any potential re-identification of where it came from.”

Topol, Pho and Reed all agree that protections are needed, especially since many apps use patients’ personal information to generate revenue.

“If you’ve been given a free application and you can’t figure out how it is being paid for, then the chances are high that it is being paid for by using your information for advertising,” said Reed.

He suggested that users research their apps before installing them to see what becomes of their collected data.

“Before you start sharing your significant health information, yes, you should absolutely do it,” he advised.

Pho’s advice is for patients to be careful about disclosing personal information on health apps and to consider related cybersecurity risks.

Privacy Rights Clearinghouse, a consumer advocacy non-profit organization, looked at both free and paid health apps, and found that 72 percent of them had security and privacy risks, including connecting [to] third party sites without a user’s knowledge or sending health data without encryption, making it vulnerable to hackers,” he said.

Even if patient privacy is secure, many doctors are not supportive of mobile apps and wearable sensors that let patients collect and interpret their own data, said Topol.

“When people are collecting their data on themselves and having software and algorithms to interpret it for them, the doctors basically are losing control,” he added. “And this doesn’t go over well.”

As a result, he said doctors often dismiss patient-generated data as flawed, even when the information is gathered through tested and approved bio-sensors. But that, in his view, is a bad attitude. He said Scripps has been testing the accuracy and the impact of this technology, with very good results.

“And this is when it becomes really important,” he said. “Up until now, you know, there really wasn’t anything that was being tracked through sensors that was making a difference.”

But capturing streaming medical data in the real world in real-time “is very different than the way medicine’s been practiced for the last two millennia, which is, you know, coming into the doctor’s office for a snapshot. And now we’ve got the whole life movie of a person,” he said.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Generation Mobile; IoT, Wearable Tech Promise; Yahoo Search

Posted June 25th, 2015 at 3:47 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Emerging ‘Gen M’ Workforce Requires a Rethink of IT Strategy

A new, independent study from MobileIron that polled more than 3,500 professionals about work and personal life has uncovered an emerging demographic called “Generation Mobile” or “Gen M” that likely will require a review of traditional IT strategies. This demographic is described as males between the ages of 18-34, and people with children under 18 who live at home who do 26 percent of their work on mobile devices and use the same devices to switch between work and personal tasks.

A new report from the McKinsey Global Institute foresees great economic potential for always-connected Internet of Things devices that could generate global profits ranging between $4 trillion and $11 trillion by 2025.

Japanese engineers have printed electrodes and wires on a prototype wrist band made of stretchable fabric. Elastic conductors, usually made by mixing conductive fillers and rubber, lose conductivity when the ink is stretched. But the researchers have developed new, highly conductive ink that is both stretchable and printable.

The recent revelation that Samsung has been blocking Windows update from running on some of its devices has prompted a condemnation from Microsoft. A company statement said “Windows Update remains a critical component of our security commitment to our customers. We do not recommend disabling or modifying Windows Update in any way as this could expose a customer to increased security risks.” Samsung had said the blocking was meant to prevent overwriting of incompatible drivers.

In case you didn’t know, Google had loaded its open source browser Chromium with closed-source code that enabled listening in to a computer’s microphone. Google’s other browser – Chrome – has had similar issues. Now, the company has bowed to user pressure and removed the snooping code from Chromium.

Be careful when you next update your Java software. A deal between Java maker Oracle and Yahoo to promote Yahoo search will have the next Java update, beginning this month, ask users if they want Yahoo to be their default search engine on Chrome and Internet Explorer browsers. If you are not careful, the software will make the choice for you.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Mind-Controlled Robots; Samsung Updates; Flash, Android Woes

Posted June 24th, 2015 at 3:46 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Mind-Controlled Telepresence Robots Could Restore Mobility to the Disabled

Researchers at the Swiss Federal Institute of Technology’s Defitech Foundation Chair in Brain-Machine Interface in Lausanne are developing a brain-computer interface that will allow disabled people to control telepresence robots with their minds. After training, disabled users participating in early tests were able to easily control the telepresence robot.

IBM Helps Towns Predict Disasters

IBM, in partnership with The Weather Company, has developed a predictive platform called “Intelligent Operations Center for Emergency Management” that uses live forecasts and city maps to predict infrastructural damage from weather disasters.

Samsung is Disabling Windows Update on Some PCs It Sells

Microsoft expert Patrick Barker has uncovered a file called Disable_Windowsupdate.exe that can be downloaded from Samsung’s website and apparently disables Windows updates once installed. Samsung sells. Samsung said Windows updates are disabled on some machines to prevent driver overwriting. But the lack of critical Windows security updates could prove to be a problem for a lot of users.

Adobe Patches Critical Flash Flaw

A new patch from Adobe addresses a critical Flash Player vulnerability that a Chinese hacking group has been exploiting. The update patches a flaw that affects the way Flash Player parses video files.

Android Instapaper App Vulnerable to Cyberattacks

Researchers at security firm Bitdefender have discovered a vulnerability in the Android version of the popular Instapaper app that opens users to man-in-the-middle (MITM) attacks. When users connect to a monitored Wi-Fi network, hackers can intercept Instapaper’s communication channel and get access to the user’s log-in credentials.

Microsoft to Supply Windows 10 on USB Flash Drives for Faster Installation

Microsoft’s new operating system, Windows 10, is reportedly being released in July. While the new OS will be available for download online through Windows Updates, writer Anthony Leather reports that the system will also be available on USB Flash drives.

Instagram Gets Into Real-Time News

Instagram has updated its search feature to highlight current events. The overhauled Explore tab now features trending tags for popular news events and sorts pictures by theme. The updates are currently only available in the U.S.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.