Today, Google is shutting down its popular RSS service Google Reader. Over at Gizmodo, Eric Limer about the effect the popular service had on him personally:
Every day I bounce between dozens of sites, each with its own purpose, its own content, its own look and feel. But inside Google Reader, the Internet—the carefully curated Internet I built, pruned, and tweaked—comes to me. And, more often than not, I don’t even have to leave its comfortingly familiar little interface to ingest what my little intranet has to offer. At its best, it’s my virtual study, a private reading room. At its worst, it’s a closet with a slop bucket on the floor. But it’s still my slop bucket close. Or it was.
It’s equally strange and accurate to say Googs and I were intimately familiar. I’ve barely been a working blogger for two years, and yet hastily scrawled napkin math suggests that I’ve spent upwards of 1,000 hours at http://www.google.com/reader. I’ve spent more time with Google Reader than I have with some humans I consider to be friends. In a weird sort of way, it feels like I grew up there.
Meanwhile, for those who have come to rely on Google Reader for their news fixes, Slate’s Chris Kirk has put together a hand flowchart to help you pick out the best replacement.
Like most high-tech companies, Google is highly secretive—one of the reasons Brad Stone’s glimpse at the company’s secret lab for Bloomberg makes for great reading. Here’s a taste:
Since its creation in 2010, Google has kept X largely hidden from view. Over the past month, Bloomberg Businessweek spoke to many of X’s managers and project leaders, who work with abundant resources and few of the constraints that smothered similar corporate research efforts in the past. “Anything which is a huge problem for humanity we’ll sign up for, if we can find a way to fix it,” Teller says.
Google X seeks to be an heir to the classic research labs, such as the Manhattan Project, which created the first atomic bomb, and Bletchley Park, where code breakers cracked German ciphers and gave birth to modern cryptography. After the war, the spirit of these efforts was captured in pastoral corporate settings: AT&T’s (T) Bell Labs and Xerox (XRX) PARC, for example, became synonymous with breakthroughs (the transistor and the personal computer among them) and the inability of each company to capitalize on them.
Stone’s full piece is definitely worth checking out.
Here’s some good news in the world of education. IIA member AT&T has announced it is partnering with the Georgia Institute of Technology and Massive Open Online Courses provider Udacity to launch the first online-only Master of Science degree in computer science. From the press release:
Workers with skills in Science, Technology, Engineering and Mathematics (STEM) are increasingly important to our business – and to nearly every business – because STEM drives innovation and innovation drives our economy.
During the next six years, 2.8 million STEM openings are predicted. But, today, many STEM jobs are going unfilled as candidates lack the necessary skills, training or degrees.
Through this new program, Georgia Tech will be able to offer employers like AT&T a larger and more diverse pool of highly qualified, STEM-trained workers and help the U.S. retain its global competitive edge.
Cool stuff. And on a related note, check out our recent infographic on the benefits of broadband access in eduction.
Google believes the future is in wearable computing, and that their innovative glasses Google Glass is going to lead the way. But as Brendan Sasso of The Hillreports, at least some members of Congress aren’t too keen on where Google is attempting to go:
Eight members of Congress raised privacy fears about Google’s wearable computer, Google Glass, expressing concern the device could allow users to identify people on the street and look up personal information about them.
The lawmakers, members of the congressional Privacy Caucus, said they are concerned users could access individuals’ addresses, marital status, work history and hobbies.
“As members of the Congressional Bi-Partisan Privacy Caucus, we are curious whether this new technology could infringe on the privacy of the average American,” the lawmakers wrote in a letter to Google CEO Larry Page.
In response, Google has reassured the members of Congress that privacy concerns are very much on their radar:
“We are thinking very carefully about how we design Glass because new technology always raises new issues,” a Google spokeswoman said in an emailed statement. “Our Glass Explorer program, which reaches people from all walks of life, will ensure that our users become active participants in shaping the future of this technology — and we’re excited to hear the feedback.”
4G LTE is just starting to be widely adopted here in the States, but as Jon Russell of The Next Web reports, Samsung is already working toward the next big leap in mobile broadband:
The Korean tech giant says its 5G wireless technology will be capable of providing users with data speeds of “up to several tens of Gbps per base station”. That, it says, is “several hundred times faster” than even yet-to-be-released 4G LTE technology.
In practical terms, Samsung’s estimated speeds would allow a movie to be downloaded in under one second, and it could enable a host of new services that feed off the ability to transfer large files quickly.
Over at CNN, Andrew Keen has a great story about innovation, mobile apps, and helping those with autism live better lives:
With $20,000 in prize money, the mobile app “Autism Speaks” hackathon , organized by AT&T and by the advocacy group Autism Speaks, attracted more than 25 teams of developers and was judged by panel of technology and autism experts (including myself).
The goal was to design apps to improve the lives of the one in every 88 children who, according to the American Center for Disease, are on the autism spectrum.
Via Dan Graziano of Boy Genius Reports, the New York City Police Department has embraced mobility in an effort to crack down on crime:
oughly 400 Android smartphones have been distributed to officers since last summer as part of a pilot program taking place in New York City, The New York Timesreported. The phones are unable to make or receive calls and instead use a data connection to gain access to an individual’s arrest files. An application on the device can look up a person’s criminal history, verify his or her identity with a police photograph and even display information from the Department of Motor Vehicles.
At The Huffington Post, Tarun Wadhwa offers a glimpse of what security on smartphones may be like in a few years:
For years now, consumers have been demanding a better way, something more convenient and less time-consuming. As it turns out, they may have had the answer all along without even knowing it - their body parts can serve as their next password. Biometric identification, which works by using the unique characteristics of your body to prove who you are, may be the key to a much more effective system.
In fact, it is an almost certainty that within the next few years, three biometric options will become standard features in every new phone: a fingerprint scanner built into the screen, facial recognition powered by high-definition cameras, and voice recognition based off a large collection of your vocal samples.
As Wadhwa points out, given how much personal data is now stored on our tiny devices — and how easy it is for thieves to pluck those devices from our hands — biometric is a matter of when, not if.
Sebastian Anthony of Extreme Tech reports on a big breakthrough in the ongoing mission to speed up how data travels:
Researchers at the University of Southampton in England have produced optical fibers that can transfer data at 99.7% of the universe’s speed limit: The speed of light. The researchers have used these new optical fibers to transfer data at 73.7 terabits per second — roughly 10 terabytes per second, and some 1,000 times faster than today’s state-of-the-art 40-gigabit fiber optic links, and at much lower latency.
How would this translate in the real world? Well, if your average HD movie download is 4 gigabytes, then data moving at the speed of light would basically amount to 25,310 HD movies per second.
And speaking of Apple, Peter Burrows and Olga Kharif of Bloomberg check in a long-rumored project for the company:
While Tim Cook has dropped hints that Apple Inc. (AAPL) is hard at work on a television to drive the next era of growth, the company’s wristwatch-style device, still in development, may prove more profitable.
The global watch industry will generate more than $60 billion in sales in 2013, said Citigroup Inc. analyst Oliver Chen. While that’s smaller than the pool of revenue that comes from TVs, gross margins on watches are about 60 percent, he said. That’s four times bigger than for televisions, according to Anand Srinivasan, a Bloomberg Industries analyst.
So far, the iWatch is nothing more than a rumor — but then, that’s not surprising from a secretive company like Apple.
Google Glass, the company’s innovative eyewear computer, is currently garnering a lot of attention. Christina Chaey of Fast Companylooks at a recent contest asking people for ideas the high-tech glasses could be used for:
A daily calorie tracker. A lifeline to a 911 operator. A real-time sign language translator. These are just a few of the thousands of entries submitted to Google’s If I Had Glass competition, which ended on Wednesday. The competition was an open call in search of early-access testers, or Glass Explorers, for the highly anticipated augmented reality headset the company says will be on sale by the end of 2013.
While Google Glass has many techies excited, Mark Hurst of Creative Good fires a warning flare about the device (italics his):
Yes, the glasses look dorky – Google will fix that. And sure, Glass forces users to be permanently plugged-in to Google’s digital world – that’s hardly a concern for the company or, for that matter, most users out there. No. The real issue raised by Google Glass, which will either cause the project to fail or create certain outcomes you may not want (which I’ll describe), has to do with the lifebits. Once again, it’s an issue of experience.
The Google Glass feature that (almost) no one is talking about is the experience – not of the user, but of everyone other than the user.
Here’s something interesting for your Friday. At GigaOm, Laura Hazard Owen writes about a research project aimed at predicting the future:
Researchers at Microsoft and the Technion-Israel Institute of Technology are creating software that analyzes 22 years of New York Times archives, Wikipedia and about 90 other web resources to predict future disease outbreaks, riots and deaths — and hopefully prevent them.
The new research is the latest in a number of similar initiatives that seek to mine web data to predict all kinds of events. Recorded Future, for instance, analyzes news, blogs and social media to “help identify predictive signals” for a variety of industries, including financial services and defense. Researchers are also using Twitter and Google to track flu outbreaks.
In this day and age, passwords for the various online services and devices can be hard to manage. Now, Robert McMillan of Wiredreports, Google is aiming to revolutionize how we protect ourselves online:
[Google is] experimenting with new ways to replace the password, including a tiny Yubico cryptographic card that — when slid into a USB (Universal Serial Bus) reader — can automatically log a web surfer into Google. They’ve had to modify Google’s web browser to work with these cards, but there’s no software download and once the browser support is there, they’re easy to use. You log into the website, plug in the USB stick and then register it with a single mouse click.
They see a future where you authenticate one device — your smartphone or something like a Yubico key — and then use that almost like a car key, to fire up your web mail and online accounts.
In the future, they’d like things to get even easier, perhaps connecting to the computer via wireless technology.
“We’d like your smartphone or smartcard-embedded finger ring to authorize a new computer via a tap on the computer, even in situations in which your phone might be without cellular connectivity,” the Googlers write.
The New York Times’ Brian X. Chen attended CES in Las Vegas last week and came away with an interesting take on how mobility is changing our lives:
For several years, technology companies have promised the dream of the connected home, the connected body and the connected car. Those connections have proved illusory. But in the last year app-powered accessories have provided the mechanism to actually make the connections. That is partly because smartphones have become the device people never put down. But it is also because wireless sensors have become smaller, cheaper and ubiquitous.
With Hurricane Sandy bearing down on the east coast, safety is on everyone’s mind. And a key to safety during times of crisis is communication.
Back in June, Gregg Riddle, President of the Daytona Beach-based Association of Public-Safety Communications Officials International, penned a helpful op-ed for the Daytona Beach News-Journal with tips on how you — with the help of your smartphone — can play a role in helping protect yourself and your family during natural disasters:
• Keep your phone fully charged, and keep it dry by placing it in a sealable plastic bag if you will be in an area where you may be exposed to water.
• Forward your home number to your wireless phone, so you are able to receive all calls regardless of your location.
• Learn community hurricane-evacuation routes and how to find shelter on higher ground. Location-based mapping on your smartphone can help with this.
• Make a family communications plan. According to the Federal Emergency Management Agency, you should identify a contact out-of-state who can take calls from household members. It may be easier to make a long-distance phone call than to call across town, so an out-of-town contact may be in a better position to communicate among separated family members. Also, be sure every member of your family knows the phone number and has a cellphone, coins or a prepaid phone card to call the emergency contact. If you have a cellphone, program that contact person as “ICE” (In Case of Emergency) in your phone. If you are in an accident, emergency personnel will often check your ICE listings in order to contact someone you know. Make sure to tell your family and friends that you’ve listed them as emergency contacts.
Riddle also highlighted the role app developers now play by creating useful storm-tracking tools, and how wireless providers — via investment and innovation — work overtime to help affected areas stay connected:
As part of a commitment to emergency preparedness, wireless carriers are also taking numerous steps to be ready for emergencies, such as adding capacity to their wireless networks to support increased call volume, including emergency 9-1-1 calls and setting up portable generators. After a storm, carrier-driven response efforts include deploying mobile cell sites and command centers, emergency-communications vehicles, and even a self-sufficient “base camp” for communications-recovery workers.
Riddle’s full op-ed is definitely worth checking out. Stay safe everyone!
Speaking of Apple — and its iPads — John Paul Titlow of Read Write examines how the company is quietly overhauling education:
When Apple made its first official foray into digital textbooks earlier this year, I was skeptical. It seemed clear that iBooks 2, iBooks Author and the new “textbooks” section of the iBookstore would not revolutionize the education market anytime soon, even if the longterm potential was obvious. Tuesday, Apple shared some early results from those efforts and revealed the next phase of its overhaul of education. It’s definitely onto something.
Most of the 100 million iPads sold worldwide were purchased by consumers and businesses, but a growing number of those buyers are school districts. In the last nine months, 2,500 classrooms have started using iBooks textbooks, Apple CEO Tim Cook announced. Their content now covers 80% of the core high school curriculum in the United States. It’s not a bad start, but Apple has a long way to go before iBooks makes an iTunes-like impact.
AGREEMENT BETWEEN USER AND Internet Innovation Alliance
The Internet Innovation Alliance Web Site is comprised of various Web pages operated by Internet Innovation Alliance.
The Internet Innovation Alliance Web Site is offered to you conditioned on your acceptance without modification of the terms, conditions, and notices contained herein. Your use of the Internet Innovation Alliance Web Site constitutes your agreement to all such terms, conditions, and notices.
Internet Innovation Alliance reserves the right to change the terms, conditions, and notices under which the Internet Innovation Alliance Web Site is offered, including but not limited to the charges associated with the use of the Internet Innovation Alliance Web Site.
LINKS TO THIRD PARTY SITES
The Internet Innovation Alliance Web Site may contain links to other Web Sites (“Linked Sites”). The Linked Sites are not under the control of Internet Innovation Alliance and Internet Innovation Alliance is not responsible for the contents of any Linked Site, including without limitation any link contained in a Linked Site, or any changes or updates to a Linked Site. Internet Innovation Alliance is not responsible for webcasting or any other form of transmission received from any Linked Site. Internet Innovation Alliance is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by Internet Innovation Alliance of the site or any association with its operators.
NO UNLAWFUL OR PROHIBITED USE
As a condition of your use of the Internet Innovation Alliance Web Site, you warrant to Internet Innovation Alliance that you will not use the Internet Innovation Alliance Web Site for any purpose that is unlawful or prohibited by these terms, conditions, and notices. You may not use the Internet Innovation Alliance Web Site in any manner which could damage, disable, overburden, or impair the Internet Innovation Alliance Web Site or interfere with any other party’s use and enjoyment of the Internet Innovation Alliance Web Site. You may not obtain or attempt to obtain any materials or information through any means not intentionally made available or provided for through the Internet Innovation Alliance Web Sites.
USE OF COMMUNICATION SERVICES
The Internet Innovation Alliance Web Site may contain bulletin board services, chat areas, news groups, forums, communities, personal web pages, calendars, and/or other message or communication facilities designed to enable you to communicate with the public at large or with a group (collectively, “Communication Services”), you agree to use the Communication Services only to post, send and receive messages and material that are proper and related to the particular Communication Service. By way of example, and not as a limitation, you agree that when using a Communication Service, you will not:
Defame, abuse, harass, stalk, threaten or otherwise violate the legal rights (such as rights of privacy and publicity) of others.
Publish, post, upload, distribute or disseminate any inappropriate, profane, defamatory, infringing, obscene, indecent or unlawful topic, name, material or information.
Upload files that contain software or other material protected by intellectual property laws (or by rights of privacy of publicity) unless you own or control the rights thereto or have received all necessary consents.
Upload files that contain viruses, corrupted files, or any other similar software or programs that may damage the operation of another’s computer.
Advertise or offer to sell or buy any goods or services for any business purpose, unless such Communication Service specifically allows such messages.
Conduct or forward surveys, contests, pyramid schemes or chain letters.
Download any file posted by another user of a Communication Service that you know, or reasonably should know, cannot be legally distributed in such manner.
Falsify or delete any author attributions, legal or other proper notices or proprietary designations or labels of the origin or source of software or other material contained in a file that is uploaded.
Restrict or inhibit any other user from using and enjoying the Communication Services.
Violate any code of conduct or other guidelines which may be applicable for any particular Communication Service.
Harvest or otherwise collect information about others, including e-mail addresses, without their consent.
Violate any applicable laws or regulations.
Internet Innovation Alliance has no obligation to monitor the Communication Services. However, Internet Innovation Alliance reserves the right to review materials posted to a Communication Service and to remove any materials in its sole discretion. Internet Innovation Alliance reserves the right to terminate your access to any or all of the Communication Services at any time without notice for any reason whatsoever.
Internet Innovation Alliance reserves the right at all times to disclose any information as necessary to satisfy any applicable law, regulation, legal process or governmental request, or to edit, refuse to post or to remove any information or materials, in whole or in part, in Internet Innovation Alliance’s sole discretion.
Always use caution when giving out any personally identifying information about yourself or your children in any Communication Service. Internet Innovation Alliance does not control or endorse the content, messages or information found in any Communication Service and, therefore, Internet Innovation Alliance specifically disclaims any liability with regard to the Communication Services and any actions resulting from your participation in any Communication Service. Managers and hosts are not authorized Internet Innovation Alliance spokespersons, and their views do not necessarily reflect those of Internet Innovation Alliance.
Materials uploaded to a Communication Service may be subject to posted limitations on usage, reproduction and/or dissemination. You are responsible for adhering to such limitations if you download the materials.
MATERIALS PROVIDED TO Internet Innovation Alliance OR POSTED AT ANY Internet Innovation Alliance WEB SITE
Internet Innovation Alliance does not claim ownership of the materials you provide to Internet Innovation Alliance (including feedback and suggestions) or post, upload, input or submit to any Internet Innovation Alliance Web Site or its associated services (collectively “Submissions”). However, by posting, uploading, inputting, providing or submitting your Submission you are granting Internet Innovation Alliance, its affiliated companies and necessary sublicensees permission to use your Submission in connection with the operation of their Internet businesses including, without limitation, the rights to: copy, distribute, transmit, publicly display, publicly perform, reproduce, edit, translate and reformat your Submission; and to publish your name in connection with your Submission.
No compensation will be paid with respect to the use of your Submission, as provided herein. Internet Innovation Alliance is under no obligation to post or use any Submission you may provide and may remove any Submission at any time in Internet Innovation Alliance’s sole discretion.
By posting, uploading, inputting, providing or submitting your Submission you warrant and represent that you own or otherwise control all of the rights to your Submission as described in this section including, without limitation, all the rights necessary for you to provide, post, upload, input or submit the Submissions.
THE INFORMATION, SOFTWARE, PRODUCTS, AND SERVICES INCLUDED IN OR AVAILABLE THROUGH THE Internet Innovation Alliance WEB SITE MAY INCLUDE INACCURACIES OR TYPOGRAPHICAL ERRORS. CHANGES ARE PERIODICALLY ADDED TO THE INFORMATION HEREIN. Internet Innovation Alliance AND/OR ITS SUPPLIERS MAY MAKE IMPROVEMENTS AND/OR CHANGES IN THE Internet Innovation Alliance WEB SITE AT ANY TIME. ADVICE RECEIVED VIA THE Internet Innovation Alliance WEB SITE SHOULD NOT BE RELIED UPON FOR PERSONAL, MEDICAL, LEGAL OR FINANCIAL DECISIONS AND YOU SHOULD CONSULT AN APPROPRIATE PROFESSIONAL FOR SPECIFIC ADVICE TAILORED TO YOUR SITUATION.
Internet Innovation Alliance AND/OR ITS SUPPLIERS MAKE NO REPRESENTATIONS ABOUT THE SUITABILITY, RELIABILITY, AVAILABILITY, TIMELINESS, AND ACCURACY OF THE INFORMATION, SOFTWARE, PRODUCTS, SERVICES AND RELATED GRAPHICS CONTAINED ON THE Internet Innovation Alliance WEB SITE FOR ANY PURPOSE. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SUCH INFORMATION, SOFTWARE, PRODUCTS, SERVICES AND RELATED GRAPHICS ARE PROVIDED “AS IS” WITHOUT WARRANTY OR CONDITION OF ANY KIND. Internet Innovation Alliance AND/OR ITS SUPPLIERS HEREBY DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THIS INFORMATION, SOFTWARE, PRODUCTS, SERVICES AND RELATED GRAPHICS, INCLUDING ALL IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT.
Internet Innovation Alliance reserves the right, in its sole discretion, to terminate your access to the Internet Innovation Alliance Web Site and the related services or any portion thereof at any time, without notice. GENERAL To the maximum extent permitted by law, this agreement is governed by the laws of the State of Washington, U.S.A. and you hereby consent to the exclusive jurisdiction and venue of courts in King County, Washington, U.S.A. in all disputes arising out of or relating to the use of the Internet Innovation Alliance Web Site. Use of the Internet Innovation Alliance Web Site is unauthorized in any jurisdiction that does not give effect to all provisions of these terms and conditions, including without limitation this paragraph. You agree that no joint venture, partnership, employment, or agency relationship exists between you and Internet Innovation Alliance as a result of this agreement or use of the Internet Innovation Alliance Web Site. Internet Innovation Alliance’s performance of this agreement is subject to existing laws and legal process, and nothing contained in this agreement is in derogation of Internet Innovation Alliance’s right to comply with governmental, court and law enforcement requests or requirements relating to your use of the Internet Innovation Alliance Web Site or information provided to or gathered by Internet Innovation Alliance with respect to such use. If any part of this agreement is determined to be invalid or unenforceable pursuant to applicable law including, but not limited to, the warranty disclaimers and liability limitations set forth above, then the invalid or unenforceable provision will be deemed superseded by a valid, enforceable provision that most closely matches the intent of the original provision and the remainder of the agreement shall continue in effect. Unless otherwise specified herein, this agreement constitutes the entire agreement between the user and Internet Innovation Alliance with respect to the Internet Innovation Alliance Web Site and it supersedes all prior or contemporaneous communications and proposals, whether electronic, oral or written, between the user and Internet Innovation Alliance with respect to the Internet Innovation Alliance Web Site. A printed version of this agreement and of any notice given in electronic form shall be admissible in judicial or administrative proceedings based upon or relating to this agreement to the same extent an d subject to the same conditions as other business documents and records originally generated and maintained in printed form. It is the express wish to the parties that this agreement and all related documents be drawn up in English.
COPYRIGHT AND TRADEMARK NOTICES:
All contents of the Internet Innovation Alliance Web Site are: and/or its suppliers. All rights reserved.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
The example companies, organizations, products, people and events depicted herein are fictitious. No association with any real company, organization, product, person, or event is intended or should be inferred.
Any rights not expressly granted herein are reserved.
NOTICES AND PROCEDURE FOR MAKING CLAIMS OF COPYRIGHT INFRINGEMENT
Pursuant to Title 17, United States Code, Section 512(c)(2), notifications of claimed copyright infringement under United States copyright law should be sent to Service Provider’s Designated Agent. ALL INQUIRIES NOT RELEVANT TO THE FOLLOWING PROCEDURE WILL RECEIVE NO RESPONSE. See Notice and Procedure for Making Claims of Copyright Infringement.