Posts tagged emerging technologies

Vision-correcting display nixes your need for eyeglasses

Your reading glasses will be so yesterday with UC Berkeley’s new technology

What would it be like if you didn’t need your eyeglasses to clearly see your laptop screen or a text message on your smartphone?

Scientists at the University of California Berkeley are working on computer screens that would adjust their images to accommodate individual user’s visual needs. Think of it as a display that wears the glasses so users don’t have to.

“For people with just near sightedness or far sightedness, life isn’t so bad,” said Fu-Chung Huang, the lead author of the research paper on the display project at Berkeley. “But as you get older, your lenses lose elasticity and you cannot read things close to you, like a cell phone or tablet. You need another pair of reading glasses, which can be quite inconvenient.
Scientists at the University of California Berkeley are developing a vision-correcting display that would mean users wouldn’t need their eyeglasses to see it clearly. (Video: UC Berkeley)

“With this technology, in the future, you just need to press a button and the display will accommodate to your vision,” he said in an email to Computerworld.

Users would input their vision prescription into their individual desktop, laptop or mobile device. Then when the user logs on with a password, the computer recognizes the user and automatically adjusts its display.

Researchers at Berkeley, working with scientists at MIT, are developing algorithms that will compensate for a user’s specific vision needs to adjust the image on a screen so the user can see it clearly without needing to wear corrective lenses. The software will create vision-correcting displays.

The researchers have been working on the technology for three years.
Computer screen
Researchers place a printed pinhole array mask, shown here, on top of an iPod touch as part of their prototype of a visually corrected display. (Image: Fu-Chung Huang)

A user who, for instance, needs reading glasses to see or read anything clearly on his laptop or tablet screens wouldn’t need to wear the eyeglasses if the displays adjust themselves for his vision needs.

If a user who needs one pair of glasses to see things at a distance and another pair for reading, would not need to put on reading glasses to read her emails or Facebook posts if the display could adjust itself for her near-vision needs.

The displays, according to Berkeley, also could be used for people whose vision cannot be corrected with eyeglasses or contacts.

“This project started with the idea that Photoshop can do some image deblurring to the photo, so why can’t I correct the visual blur on the display instead of installing a Photoshop in the brain?” asked Huang, who now is a software engineer at Microsoft. “The early stage is quite hard, as everyone said it is impossible. I found out that it is indeed impossible on a “conventional 2D display.” I need to modify the optical components to make this happen.”

The university said that the hardware setup adds a printed pinhole screen sandwiched between two layers of clear plastic to an iPod display to enhance image sharpness. The tiny pinholes are 75 micrometers each and spaced 390 micrometers apart.

The algorithm, which was developed at Berkeley, works by altering the intensity of each direction of light that emanates from a single pixel in an image based upon a user’s specific visual impairment, the university reported. The light then passes through the pinhole array in a way that allows the user to see a sharp image.

Huang, who has not yet talked with computer monitor or smartphone and tablet manufacturers about the research, noted that the display technology could be developed into a thin screen protector.

“The current version is still quite fragile,” he added. “It requires precise calibration between the eye and the display and it took some time to find the sweet spot for my own eye. But remember that Amazon just announced the Fire Phone with the super fancy dynamic perspective to track your eye. This technology can solve my problem … so I’m pretty optimistic about the overall progress.”

However, he said that at this point in their work, the technology wouldn’t work on a shared display such as a television screen.

“In the future, we also hope to extend this application to multi-way correction on a shared display, so users with different visual problems can view the same screen and see a sharp image,” he said.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

8 technologies that are on the way out — and one that we’ll never be rid of

In the blink of an eye, a technology that’s on top today can be made obsolete by the next big thing. Six futurists predict which of today’s common technologies are headed for the scrap heap, and what will replace them.

Soon-to-be-obsolete technologies
If “change is the only constant” applies anywhere, it’s in the world of technology. One day you’re proud of knowing how to set your VCR, and the next your DVR is recording shows you didn’t even know were on. Few would have guessed in 1980 that vinyl records would be obsolete in 15 years; fewer still would have predicted that CDs would in turn be obsolete a mere 10 years after that.

We asked a panel of experts to peer into the future and identify some business and consumer technologies that are on their way out — and what will replace them. Here are eight technologies they say we’ll soon see the back of, plus one that it looks like we’ll be stuck with forever.

So long, smartphone
You saw this one coming: “The smartphone screen will disappear altogether due to the rise of the Internet of Things (IoT) and wearable technology,” predicts Ann Mack, director of trendspotting at marketing communications firm JWT Worldwide. Indeed, research firm IDC forecasts that shipments of wearable devices like smartwatches and smart glasses will surpass 19 million units in 2014, and that the global market will reach nearly 112 million units in 2018.

But today’s wearables will themselves be swept aside by more sophisticated devices, according to Ian Campbell, CEO of Nucleus Research. “Next, the top button on my shirt is actually a computer interface to my cloud,” he says. “Google Glass will end up a niche product like Segway.”

ery personal tech
Why stop with just wearing our tech, when we can have it embedded into our bodies? From implanted RFID chips being used to unlock doors to bionic ears and eyes, pioneers are already exploring the potential of “transhumanism.”

“In 20 years it’ll be hard to tell where the person ends and the computer begins,” says Rob Enderle, principal analyst at the Enderle Group. We’ll see smarter prosthetics and military applications well before then, he adds, but it’ll take a couple decades for embedded devices to become mainstream. “Health, religious and privacy concerns will slow its adoption.”

Mo’ betta mobile power
Batteries are ubiquitous in today’s device-ridden, mobile world. But we’re all familiar with their drawbacks: They’re heavy, take a long time to charge and provide a toxic disposal challenge.

“Batteries will be replaced by supercapacitors [a.k.a. ultracapacitors], most likely, or fuel cells as more efficient ways to store and provide energy,” says Enderle. Supercapacitors operate like regular capacitors but can store much more energy. They’re expensive and don’t (yet) hold as much energy per weight as standard batteries, but they charge almost instantly and can last through a million or more charge/discharge cycles.

“They’ll be supplements within 5 years, and mass replacements should occur within 10 years,” Enderle predicts. “The need is critical to many markets like consumer electronics, defense and automotive.”

No more clicking or typing
Say goodbye to your mouse and keyboard. They will yield to “an intelligent interface that uses voice, gestures and other commands,” says William Halal, Professor Emeritus of Management, Technology & Innovation at George Washington University. “Touch and other inputs may be included, of course. But the mouse and keyboard will likely be used only by techies and those doing serious computing, and the old GUI is likely to yield to these more natural interfaces.”

But Enderle thinks there will be some resistance to this change. “We really don’t like learning new ways of doing things,” he says, “and something like this will likely be driven by the youth market. Ten years is the likely time frame, but it could take 20.”

Devices that talk — to each other
Traditional buttons and switches are already disappearing from our gadgets and appliances, with everything from clock radios to multiroom music systems now controlled by smartphone apps. Future IoT-connected devices will require less of even that kind of interaction.

“Devices will be connected but also self-diagnosing and correcting,” says Campbell. “If there’s a problem with the dishwasher, the repair person can remotely fix the issue without ever contacting me.”

We’re not ready psychologically or legally to turn over that control, cautions Enderle. “Liability concerns will keep most of this from happening until you can get localized artificial intelligence to monitor the equipment,” he says. “Otherwise, there’s too much chance for a hacker to burn down the house. This’ll take more than 15 years.”

Big data meets security
Traditionally, security measures have tended to be reactive: IT modified the company’s firewall settings after an intrusion, and anti-malware vendors updated their threat definitions after a threat had been identified.

“This approach will be replaced by predictive security,” which uses data mining and analysis to track and anticipate cyber threats, says Jai Menon, vice president and chief research officer with Dell’s Research division. Tools such as OpenDNS’ Umbrella Security Graph are already helping researchers get out in front of attacks as they’re unfolding.

Soon, Menon says, “we will start to develop countermeasures in advance, based on the prediction of new exploits.” That approach will apply not just to external threats, but also to identifying and shutting down insider threats, he adds.

Big-picture security
Access to corporate systems is usually determined by defined roles, such as administrator, business user or guest. But future systems will take into account not only a person’s role but “the device they’re using, the current threat level, the security of the location from which access is requested and so on,” says Menon. “Heuristics will monitor patterns of use, and if a user begins to do things ‘out of character,’ it will set off alerts.”

Campbell from Nucleus Research predicts that a persistent, personal identity will also be part of the new security framework. “People will have a single identity for school, personal, corporate, etc. You won’t add a new user to the corporate network but rather authorize someone’s identity.”

Mix ‘n’ match software
Many IT departments still develop custom applications for their users, but Menon says the practice will become largely extinct as application programming interfaces and packaged software services proliferate: “Salesforce provides 200,000 APIs; ProgrammableWeb is currently tracking more than 11,000 APIs; Google and Bitnami and Amazon Web Services provide hundreds. If you can’t find a service that does what you want, you probably aren’t looking hard enough.” Companies will need developers who are expert at orchestrating APIs and packaged services, he adds.

“Application development has always gotten more containerized and off-the-shelf,” agrees Campbell. “Code gave way to procedures which led to modules and then DLLs… but you’ll still need to be clever to arrange those building blocks into something useful.”

Technology’s cockroach
When it comes to email, JWT’s Mack speaks for many when she says, “There has to be a better way.”

The problem comes when you try to replace it. It’s easy to imagine a messaging service in a wearable or embedded device, but what about sending attachments? What about archiving? If you design an electronic messaging system that can send files, address multiple recipients and establish a permanent record, you end up with something a lot like email.

“Email will live on forever,” says Campbell. “I’m willing to call it the cockroach of software. We may hate it, but it will be around until the end of time.”


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Go to Top