Edge computing and fog networks must be programmed to kick in when the internet fails during disasters, a scientific research team says. That way, emergency managers can draw on impacted civilians’ location data, social networking images and tweets and use them to gain situational awareness of scenes.Routers, mobile phones and other devices should continue to collect social sensor data during these events, but instead of first attempting to send it through to traditional cloud-based depositories operated by the social network — which are unavailable due to the outage — the geo-distributed devices should divert the data to local edge computing, fog nodes and other hardened resources. Emergency officials can then access it.To read this article in full or to leave a comment, please click here
Combining power to operate equipment, as well as delivering substantial data rates that are good enough for video — in the same piece of radio kit — is now obtainable, scientists say.The developing system works similar to how charging pads provide power to a toothbrush or a mobile phone without having to be connected through wires. However, in this case, the apparatus doesn’t need any physical contact with the device and data can be sent at the same time.Magnetic fields are being used to transmit power through the air, North Carolina State University researchers say in a press release.To read this article in full or to leave a comment, please click here
Combining power to operate equipment, as well as delivering substantial data rates that are good enough for video — in the same piece of radio kit — is now obtainable, scientists say.The developing system works similar to how charging pads provide power to a toothbrush or a mobile phone without having to be connected through wires. However, in this case, the apparatus doesn’t need any physical contact with the device and data can be sent at the same time.Magnetic fields are being used to transmit power through the air, North Carolina State University researchers say in a press release.To read this article in full or to leave a comment, please click here
Web visits from desktops and tablets have declined dramatically, says Adobe Digital Insights in Adobe Mobile Trends Refresh — Q2 2017.The device people are using: their smartphone. And the majority of that device’s traffic is arriving via Wi-Fi connections, not mobile networks, the analytics-oriented research firm says. Adobe has been tracking over 150 billion visits to 400 websites and apps since 2015.The sites these mobile users are visiting are large-organization national news, media and entertainment, and retail — with over 60 percent of those smartphone visits connecting through Wi-Fi.To read this article in full or to leave a comment, please click here
Using the sky as a free heat sink could be a solution to an impending energy crunch caused by increased data use. More data generated in the future will require evermore electricity-intensive cooling — the data centers will be getting bigger.Researchers at Stanford University think they have a solution to cooling creep. They say the way to reel in the cost of getting buildings cold enough for all the servers is to augment land-based air conditioning by sending excess heat into space and chilling it there.+ Also on Network World: 9 tips to turn your data center green +
The scientists say cost savings will be in the order of 21 percent through a system they’ve been working on, and up to 70 percent, theoretically, by combining the kit with other, newer radiant systems, according to an article in IEEE Spectrum this week.To read this article in full or to leave a comment, please click here
Using the sky as a free heat sink could be a solution to an impending energy crunch caused by increased data use. More data generated in the future will require evermore electricity-intensive cooling — the data centers will be getting bigger.Researchers at Stanford University think they have a solution to cooling creep. They say the way to reel in the cost of getting buildings cold enough for all the servers is to augment land-based air conditioning by sending excess heat into space and chilling it there.+ Also on Network World: 9 tips to turn your data center green +
The scientists say cost savings will be in the order of 21 percent through a system they’ve been working on, and up to 70 percent, theoretically, by combining the kit with other, newer radiant systems, according to an article in IEEE Spectrum this week.To read this article in full or to leave a comment, please click here
Connected devices, also known as the Internet of Things (IoT), will transition to cognitive, predictive computing over the next 12 to 18 months, according to research firm Frost & Sullivan. IoT, overall, is also about to grow rapidly, the firm says. It predicts a 20.3% Compound Annual Growth Rate (CAGR) worldwide leading up to the year 2023. That will be a jump to 45.3 billion devices, up from 12.4 billion IoT devices in 2016, it claims.Cognitive computing, which is when a machine is programmed to simulate human thought processes, will partly drive that growth, along with further microelectronics development and “ubiquitous connectivity,” says Frost & Sullivan, a research and consulting firm that specializes in business disruption.To read this article in full or to leave a comment, please click here
In a push to improve storage density, new, oblong-shaped solid-state drives (SSDs) are coming from Intel by the end of the year, the company has announced. It’s just one of a bunch of new memory forms and technologies that we’ll be seeing in due course, though.Intel’s “ruler” style drives are designed to slip neatly into a standard rack. The concept abandons the premise that memory products should look like traditional magnetic hard disc drives (HDDs) or Peripheral Component Interconnect Express (PCIe) expansion cards.To read this article in full or to leave a comment, please click here
In a push to improve storage density, new, oblong-shaped solid-state drives (SSDs) are coming from Intel by the end of the year, the company has announced. It’s just one of a bunch of new memory forms and technologies that we’ll be seeing in due course, though.Intel’s “ruler” style drives are designed to slip neatly into a standard rack. The concept abandons the premise that memory products should look like traditional magnetic hard disc drives (HDDs) or Peripheral Component Interconnect Express (PCIe) expansion cards.To read this article in full or to leave a comment, please click here
The future of business will include artificial intelligence (AI) in every nook and cranny, along with transparent, immersive experiences and entirely new digital platforms, according to consulting firm Gartner.Digital business will be driven by those three megatrends over the next five to 10 years, it says.That's because a kind of joining between humans and technology is going to replace the static-like tech we’re used to. The new combination will be enabled by revolutionary amounts of data, better computing power and ubiquitous ecosystems.+ Also on Network World: Gartner Top 10 technology trends you should know for 2017 +
Importantly, to get there, new digital “ecosystem-enabling” platforms will have to replace traditional “compartmentalized technical infrastructure.”To read this article in full or to leave a comment, please click here
The future of business will include artificial intelligence (AI) in every nook and cranny, along with transparent, immersive experiences and entirely new digital platforms, according to consulting firm Gartner.Digital business will be driven by those three megatrends over the next five to 10 years, it says.That's because a kind of joining between humans and technology is going to replace the static-like tech we’re used to. The new combination will be enabled by revolutionary amounts of data, better computing power and ubiquitous ecosystems.+ Also on Network World: Gartner Top 10 technology trends you should know for 2017 +
Importantly, to get there, new digital “ecosystem-enabling” platforms will have to replace traditional “compartmentalized technical infrastructure.”To read this article in full or to leave a comment, please click here
Single wireless networks will be separated into many, layered virtual networks when 5G is launched, experts say. The technique, called network slicing, is of a similar concept to software-defined networking (SDN), found now in some fixed networking, where managers program network behavior.The way dynamic network slicing will work is that communications specific to a particular 5G application, such as those found in Internet of Things (IoT) sensors or video, will be layered over the top of a common infrastructure, then software will manage the different service types.To read this article in full or to leave a comment, please click here
Edge computing, where processing takes place closer to the end user in order to reduce latency, among other things, is set to balloon according to a researcher.Mobile Edge Computing (MEC) will grow with a high compound annual growth rate (CAGR) of about 50.2 percent per year over the next few years (2016-2023), says Occams Business Research and Consulting, which published research in July.Yet-to-be-launched 5G wireless networks and overall increasing use of data will be among the drivers. Global mobile data should reach 69 exabytes by the close of 2022, up from 8.9 exabytes in 2016, the report says.To read this article in full or to leave a comment, please click here
Edge computing, where processing takes place closer to the end user in order to reduce latency, among other things, is set to balloon according to a researcher.Mobile Edge Computing (MEC) will grow with a high compound annual growth rate (CAGR) of about 50.2 percent per year over the next few years (2016-2023), says Occams Business Research and Consulting, which published research in July.Yet-to-be-launched 5G wireless networks and overall increasing use of data will be among the drivers. Global mobile data should reach 69 exabytes by the close of 2022, up from 8.9 exabytes in 2016, the report says.To read this article in full or to leave a comment, please click here
Edge computing, where processing takes place closer to the end user in order to reduce latency, among other things, is set to balloon, according to a researcher.Mobile Edge Computing (MEC) will grow with a high compound annual growth rate (CAGR) of about 50.2 percent per year over the next few years (2016-2023), says Occams Business Research and Consulting, which published research in July.Yet-to-be-launched 5G wireless networks and overall increasing use of data will be among the drivers. Global mobile data should reach 69 exabytes by the close of 2022, up from 8.9 exabytes in 2016, the report says.To read this article in full or to leave a comment, please click here
The traditional approaches to data storage reduction aren’t creating the necessary density savings that will be required in the future, some scientists say. We’re creating a lot of ones and zeros these days, and we will be generating many more.To handle that, researchers say data should be completely re-written. It should use a four-symbol code, rather than classic two-symbol binary. That, coupled with chemical solutions for carrying the media, along with light, will greatly shrink data storage density, researchers say.Chemists at Case Western Reserve University say the current approach, which is to make existing storage, like drives, more compact—pushing the data closer together by reducing space, for example—isn’t the way to go.To read this article in full or to leave a comment, please click here
The traditional approaches to data storage reduction aren’t creating the necessary density savings that will be required in the future, some scientists say. We’re creating a lot of ones and zeros these days, and we will be generating many more.To handle that, researchers say data should be completely re-written. It should use a four-symbol code, rather than classic two-symbol binary. That, coupled with chemical solutions for carrying the media, along with light, will greatly shrink data storage density, researchers say.Chemists at Case Western Reserve University say the current approach, which is to make existing storage, like drives, more compact—pushing the data closer together by reducing space, for example—isn’t the way to go.To read this article in full or to leave a comment, please click here
Computer scientists are developing a mind-reading computer that deciphers symbols that people have looked at.The device accurately replicates shapes seen. The computer scans brain activity, then successfully redraws those numerals and symbols, say scientists working on the project.It’s a “step towards a direct ‘telepathic’ connection between brains and computers,” said the Chinese Academy of Sciences (CAS) in a May news article. And indeed, should it work reliably, it would be a significant improvement on simple Functional Magnetic Resonance Imaging (fMRI) scans, which just read activity in parts of the brain and are used primarily for research.To read this article in full or to leave a comment, please click here
The most secure form of network ever created has been successfully real-world-tested in China, said a publication there yesterday.Quantum entanglement—the tech that drives quantum networks—is a part of quantum-key distribution (QKD). Roughly, it gains its supposedly unhackable nature because the subatomic particles that make up the data impact each other all at the same time, regardless of where they are in the transmission.That means that because all of the cryptographic keys are intertwined, it’s possible to see at any time if bits have been corrupted. That includes being stolen or erased. Any disruption becomes transparent and throws an error. One can’t hack the system, experts say.To read this article in full or to leave a comment, please click here
The most secure form of network ever created has been successfully real-world-tested in China, said a publication there yesterday.Quantum entanglement—the tech that drives quantum networks—is a part of quantum-key distribution (QKD). Roughly, it gains its supposedly unhackable nature because the subatomic particles that make up the data impact each other all at the same time, regardless of where they are in the transmission.That means that because all of the cryptographic keys are intertwined, it’s possible to see at any time if bits have been corrupted. That includes being stolen or erased. Any disruption becomes transparent and throws an error. One can’t hack the system, experts say.To read this article in full or to leave a comment, please click here