Tag Archives: paperless

E Paper Vs the Computer

Frage eines Standbesuchers "Läuft Wikiped...

Image via Wikipedia

There has been one thing that I have wondered about, when looking at the development of E Paper , will it replace the computer, does it want to replace the computer and will it be allowed to replace the computer.

 Looking at the development of E Paper one would assume that in the beginning this was to assist the resolution and readability of the computer screen back in the 1970s.

If we view the facts so far with regards to the development,  E Paper has been developed  as a viewing and reading tablet and a device that you can down load or transfer reading material , in general terms thats it.

In non technical terms E paper could be a tablet that has selected software parameters and is designed with a flexible material to give the feeling that it has paper properties.

 So with these observations will the E Paper be a competitor to the PC!!

I generally don’t think so, but with my next breath I hope they do not over engineer this fantastic opportunity, coming from an engineering back ground we try to make things simple and easy to design, it should be said that I hope it finds it place within this technological media and also the work place.

In my other posts I have blown caution to the wind and stated that this may have already happened, let’s keep it simple, design it for its purpose.

Would we be right to assume that the computer and E Paper will both have a rightful place weather it’s for social media or within the work place hopefully both will be able to work along side each other.

Advertisements

E Paper and a “Pretentious Stigma”

Fish and chips traditionally wrapped in white ...

Image via Wikipedia

If you have been following any of my posts you will have noticed that I encourage technological advances but for a realistic and practical approach which can assist paperless systems and the concept of the paperless office.

I do believe that there is still an aristocratic or a pretentious stigma surrounding certain technological products around at the moment, this mainly been the development of E paper, not only E Paper but also technological developments to help us to combat the development of any paperless product.

We all understand that the progressive growth of the paperless office started very simply when software programmes were available for your PC, This over the years has encouraged people to start to use the standard computers to assist the development of the paperless office.

We all know now that E paper is the next big thing to tackle the development of a paperless society or a substitute or even a replacement for paper. Well that’s what I think! In the terms of what was produced on traditional paper is now been replaced by e paper or a product device that wants to replace paper.

I have often wondered if we have really thought or considered that we used paper for, I don’t mean in the ever day items like toilet paper or wrapping up your fish and chips (English way of eating) but paper that is used as a communication tool.

Communicating in the areas of the work environment and also social activities, I say social activities, but what did we use paper for as a social activity, reading books, magazines and Newspapers. I think there are the many areas which will come to everyone’s mind and I am sure that there will be a few other areas that you will think of in time.

One of my points is that why are the developers solely marketing the social side of these products, the skiff reader was designed for newspapers and magazines, most of the tables that are on the market have a underlining approach to social activities.

I honesty believe that we are scared to say that if we design an e paper product like the skiff reader, Sony e paper etc, that actually replaces paper, will the user turn around and state “is that all it does” !!!!, But really that’s all we want it to do, replace the paper that we use as a communication tool.

 The next big question is that can e paper work along side the computer!


E Paper : Should we stop ?

Why do we have to be careful, if we look at the steady progressive growth of the development of e paper form the computer screen technology to the present flexible readable sheets and wonder what this application can also be developed for?

A lot of articles and reports are indicating that it will assist the development of reading to the areas of down loading educational reports, manuals and scripts etc, this can only be a good thing or is it.

I say that not wanting to stop this technology advances but also have some concerns of how this has grown or developed and what will it develop into.

I have repeated this sentence in so many of my posts and I will repeat it again on how the customer perceives the product and not what the product has been perceived into.

If we have an imaginary world and e paper has been developed and all things are great, what is the next step ?

How can the e paper be manufactured at a cheap price and in the real world what will it compete with Paper products, books and printing in general etc?

The concept of the paperless office had the same problem and is only starting to be accepted as a real product will the e paper have the same problem!

I do believe that the e paper must stop, stop in the sense that technology must stop making in to a product that is not usable to the every day person.

What has happened is that as technology has grown from one product and transferred part of that technology into another product.

If we look at the e paper, it started from the computer screen and then went into mobiles phones and eventually turned into flexible sheets .

What will happen is that if the latest e paper or flexible sheet is not transferred into a commercial product that every person can use then we will throw more technology at it ,nobody will be able to use it because of what I have mentioned above and it will repeat it’s self and an other product will benchmark the latest version of the technology of the e paper.

They will place it into the computer device and the e paper will not be E paper, it will be an latest computer tablet that will allows you to read at a better resolution and quality.

The rolling technology situation will start all over again and this will keep repeating to the level that we will be reading articles that are stating that the e paper is pipe dream and will never happen in our life time.  

This may be a different view but if you look at this closely you can see this happening already, the e paper is starting to become recognised but we have not targeted a commercial market yet. I hope this does not happen and we stop and take a closer look and a person or an organisation takes this to the next step.

Before it’s to late !!!!!!


ISO 27002

ISO 27002 Codes of Practice 

Like governance, information security is a broad topic with ramifications in all parts of the modern organization.  Information security, and hence ISO/IEC 27002, is relevant to all types of organization including commercial enterprises of all sizes (from one-man-bands up to multinational giants), not-for-profits, charities, government departments and quasi-autonomous bodies – in fact any organization that handles and depends on information. The specific information security requirements may be different in each case but the whole point of ISO27k is that there is a lot of common ground.

The standard is explicitly concerned with information security, meaning the security of information assets, and not just IT/systems security per se.  The IT Department is merely the custodian of a good proportion of the organization’s information assets and is commonly charged with securing them by the information asset owners – the business managers who are accountable for the assets.  However a large proportion of written and intangible information (e.g. the knowledge and experience of non-IT workers) is nothing to do with IT.

Relationship to ISO/IEC 27001

ISO/IEC 27001 formally defines the mandatory requirements for an Information Security Management System (ISMS).  It uses ISO/IEC 27002 to indicate suitable information security controls within the ISMS, but since ISO/IEC 27002 is merely a code of practice/guideline rather than a certification standard, organizations are free to select and implement other controls, or indeed adopt alternative complete suites of information security controls) as they see fit.  ISO/IEC 27001 incorporates a summary (little more that than the section titles in fact) of controls from ISO/IEC 27002 under its Annex A.  In practice, organizations that adopt ISO/IEC 27001 also substantially adopt ISO/IEC 27002.

Structure and format of ISO/IEC 27002

ISO/IEC 27002 is a code of practice – a generic, advisory document, not truly a standard or formal specification such as ISO/IEC 27001. It lays out a reasonably well structured set of suggested controls to address information security risks, covering confidentiality, integrity and availability aspects. Organizations that adopt ISO/IEC 27002 must assess their own information security risks and apply suitable controls, using the standard for guidance. Strictly speaking, none of the controls are mandatory but if an organization chooses not to adopt something as common as, say, antivirus controls, they should certainly be prepared to demonstrate that this decision was reached through a rational risk management decision process, not just an oversight, if they anticipate being certified compliant to ISO/IEC 27001.

After the introduction, scope, terminology and structure sections, the remainder of ISO/IEC 27002 specifies some 39 control objectives to protect information assets against threats to their confidentiality, integrity and availability.  These control objectives in effect comprise a generic functional requirements specification for an organization’s information security management controls architecture.

There is one control objective for each second level heading in sections 6 through 15 of the standard (e.g. 8.2), or for the first level headings in the main sections with no second levels(i.e. sections 5 and 14).

Few people would quarrel with most of the control objectives, or, to put that an other way, it would be difficult to argue that the organization should not conform with the stated objectives in general.  However, some are not applicable in every case and the generic wording of the standard is unlikely to reflect each organization’s precise requirements. 

In our experience, the control objectives make an excellent starting point to define a comprehensive set of “axioms” or high level principles for information security policies with only slight re-wording.

Not mandating specific controls is a master stroke that makes the standard broadly applicable even as the technology and security risks change, and gives users tremendous flexibility in the implementation.  Unfortunately, it also makes it difficult for the certification bodies to assess whether an organization is fully compliant with the standard, hence there are no formal compliance certificates against ISO/IEC 27002 itself.  Organizations may instead get their information security governance/management processes, meaning the Information Security Management System as a whole, certified against ISO/IEC 27001 which describes the process for assessing risks and selecting, implementing and managing specific security controls from ISO/IEC 27002 or indeed other sources.

Section 0

Introduction

Starting from ‘What is information security?, the introduction explains how to make use of the standard.

Section 1

Scope

The standard gives information security management recommendations for those who are responsible for initiating, implementing or maintaining security.

Section 2

Terms and definitions

“Information security” is explicitly defined as the “preservation of confidentiality, integrity and availability of information”.  These and other related terms are further defined.  [In due course when ISO/IEC 27002 is revised, this section will presumably reference definitions in ISO/IEC 27000.]

Section 3

Structure of this standard

This page simply explains that the guts of the standard contain control objectives, suggested controls and implementation guidance.

Section 4

Risk assessment and treatment

ISO/IEC 27002 covers the topic of risk management in just a page and a half, woefully inadequate coverage for such a complex and central element of information security.  [When ISO/IEC 27002 is revised, it will probably reference ISO/IEC 27005 here although it has been suggested that the risk management section might be dropped entirely from ’27002 and moved to ’27001.  In keeping with the style of ’27002, ’27005 gives general guidance on selecting and using appropriate methods to analyze information security risk – it does not mandate a specific method since ‘appropriate’ depends on context.]

Section 5

Security policy

Management should define a policy to clarify their direction of, and support for, information security, meaning a short, high-level information security policy statement laying down the key information security directives and mandates for the entire organization.  This is normally supported by a comprehensive suite of more detailed corporate information security policies, typically in the form of an information security policy manual.  The policy manual in turn is supported by a set of information security standards, procedures and guidelines.

Although the standards are somewhat ambiguous on this point, the information security policy noted in ISO/IEC 27002 is generally understood to be separate and different from the ISMS policy required by ISO/IEC 27001.  The ISMS policy is seen by some as a strategy or governance paper laying out management’s support for the ISMS as a whole – in fact it may be as short at a statement by the CEO.

Section 6

Organization of information security

A suitable information security governance structure should be designed and implemented.

6.1 

Internal organization

The organization should have a management framework for information security. Senior management should provide direction and commit their support, for example by approving information security policies. Roles and responsibilities should be defined for the information security function. Other relevant functions should cooperate and coordinate their activities.  IT facilities should be authorized.  Confidentiality agreements should reflect the organization’s needs.  Contacts should be established with relevant authorities (e.g. law enforcement) and special interest groups.  Information security should be independently reviewed.

6.2 

External parties

Information security should not be compromised by the introduction of third party products or services.  Risks should be assessed and mitigated. when dealing with customers and in third party agreements.

 Section 7

 Asset management

The organization should be in a position to understand what information assets it holds, and to manage their security appropriately.

 7.1 

Responsibility for assets

All [information] assets should be accounted for and have a nominated owner.  An inventory of information assets (IT hardware, software, data, system documentation, storage media, supporting assets such as computer room air conditioners and UPSs, and ICT services) should be maintained. The inventory should record ownership and location of the assets, and owners should identify acceptable uses.

7.2 

Information classification

Information should be classified according to its need for security protection and labeled accordingly.  [While this is clearly most relevant to military and government organizations handling ‘protectively marked information’ (Top Secret etc.), the concept of identifying important assets, classifying/grouping them, and applying controls that are judged suitable for assets of that nature, is broadly applicable.]

Section 8:

Human resources security

The organization should manage system access rights etc. for ‘joiners, movers and leavers’, and should undertake suitable security awareness, training and educational activities.

8.1 

Prior to employment

Security responsibilities should be taken into account when recruiting permanent employees, contractors and temporary staff (e.g. through adequate job descriptions, pre-employment screening) and included in contracts (e.g. terms and conditions of employment and other signed agreements on security roles and responsibilities).

8.2

During employment

Management responsibilities regarding information security should be defined.  Employees and (if relevant) third party IT users should be made aware, educated and trained in security procedures.  A formal disciplinary process is necessary to handle security breaches.

8.3 

Termination or change of employment

Security aspects of a person’s exit from the organization (e.g. the return of corporate assets and removal of access rights) or change of responsibilities should be managed.

Section 9

Physical and environmental security

Valuable IT equipment should be physically protected against malicious or accidental damage or loss, overheating, loss of mains power etc.

9.1 

Secure areas

This section describes the need for concentric layers of physical controls to protect sensitive IT facilities from unauthorized access.

9.2 

Equipment security

Critical IT equipment, cabling and so on should be protected against physical damage, fire, flood, theft etc., both on- and off-site. Power supplies and cabling should be secured. IT equipment should be maintained properly and disposed of securely.

Section 10 

Communications and operations management

This lengthy, detailed section of the standard describes security controls for systems and network management.

10.1 

Operational procedures and responsibilities

IT operating responsibilities and procedures should be documented. Changes to IT facilities and systems should be controlled. Duties should be segregated between different people where relevant (e.g. access to development and operational systems should be segregated).

10.2 

Third party service delivery management

Security requirements should be taken into account in third party service delivery (e.g. IT facilities management or outsourcing), from contractual terms to ongoing monitoring and change management.  Do you have suitable security clauses in the contract with your ISP?

10.3 

System planning and acceptance

Covers IT capacity planning and production acceptance processes.

10.4 

Protection against malicious and mobile code

Describes the need for anti-malware controls, including user awareness.  Security controls for mobile code ‘associated with a number of middleware services’ are also outlined.

10.5 

Back-up

Covers routine data backups and rehearsed restoration.

10.6 

Network security management

Outlines secure network management, network security monitoring and other controls.  Also covers security of commercial network services such as private networks and managed firewalls etc.

10.7 

Media handling

Operating procedures should be defined to protect documents and computer media containing data, system information etc. Disposal of backup media, documents, voice and other recordings, test data etc. should be logged and controlled. Procedures should be defined for securely handling, transporting and storing backup media and system documentation.

10.8 

Exchange of information

Information exchanges between organizations should be controlled, for example though policies and procedures, and legal agreements. Information exchanges should also comply with applicable legislation. Security procedures and standards should be in place to protect information and physical media in transit, including electronic messaging (email, EDI and IM) and business information systems.

10.9

Electronic commerce services

The security implications of eCommerce (online transaction systems) should be evaluated and suitable controls implemented.  The integrity and availability of information published online (e.g. on websites) should also be protected.

10.10

Monitoring

Covers security event/audit/fault logging and system alarm/alert monitoring to detect unauthorized use.  Also covers the need to secure logs and synchronize system clocks.

Section 11

Access control

Logical access to IT systems, networks and data must be suitably controlled to prevent unauthorized use.  This is another lengthy and detailed section.

11.1 

Business requirement for access control

The organization’s requirements to control access to information assets should be clearly documented in an access control policy, including for example job-related access profiles (role based access control).  [This is an important obligation for information asset owners.]

11.2 

User access management

The allocation of access rights to users should be formally controlled through user registration and administration procedures (from initial user registration through to removal of access rights when no longer required), including special restrictions over the allocation of privileges and management of passwords, and regular access rights reviews.

11.3 

User responsibilities

Users should be made aware of their responsibilities towards maintaining effective access controls e.g. choosing strong passwords and keeping them confidential. Systems and information should be secured when left unattended (e.g. clear desk and clear screen policies).

11.4 

Network access control

Access to network services should be controlled, both within the organization and between organizations. Policy should be defined and remote users (and possibly equipment) should be suitably authenticated.  Remote diagnostic ports should be securely controlled. Information services, users and systems should be segregated into separate logical network domains.  Network connections and routine should be controlled where necessary. 

11.5 

Operating system access control

Operating system access control facilities and utilities (such as user authentication with unique user IDs and managed passwords, recording use of privileges and system security alarms) should be used. Access to powerful system utilities should be controlled and inactivity timeouts should be applied.

11.6 Application and information access control

Access to and within application systems should be controlled in accordance with a defined access control policy. Particularly sensitive applications may require dedicated (isolated) platforms, and/or additional controls if run on shared platforms.

11.7 

Mobile computing and teleworking

There should be formal policies covering the secure use of portable PCs, PDAs, cellphones etc., and secure teleworking (“working from home”, “road warriors” and other forms of mobile or remote working).

Section 12

Information systems acquisition, development and maintenance

Information security must be taken into account in the Systems Development Lifecycle (SDLC) processes for specifying, building/acquiring, testing, implementing and maintaining IT systems.

12.1 

Security requirements of information systems

Automated and manual security control requirements should be analyzed and fully identified during the requirements stage of the systems development or acquisition process, and incorporated into business cases.  Purchased software should be formally tested for security, and any issues risk-assessed.

12.2 

Correct processing in application systems

Data entry, processing and output validation controls and message authentication should be provided to mitigate the associated integrity risks.

12.3 

Cryptographic controls

A cryptography policy should be defined, covering roles and responsibilities, digital signatures, non-repudiation, management of keys and digital certificates etc.

12.4 

Security of system files

Access to system files (both executable programs and source code) and test data should be controlled.

12.5 

Security in development and support processes

Application system managers should be responsible for controlling access to [development] project and support environments.  Formal change control processes should be applied, including technical reviews.  Packaged applications should ideally not be modified. Checks should be made for information leakage for example via covert channels and Trojans if these are a concern. A number of supervisory and monitoring controls are outlined for outsourced development.

12.6

Technical vulnerability management

Technical vulnerabilities in systems and applications should be controlled by monitoring for the announcement of relevant security vulnerabilities, and risk-assessing and applying relevant security patches promptly.

Section 13

Information security incident management

Information security events, incidents and weaknesses (including near-misses) should be promptly reported and properly managed.

13.1

Reporting in information security events and weaknesses

An incident reporting/alarm procedure is required, plus the associated response and escalation procedures.  There should be a central point of contact, and all employees, contractors etc. should be informed of their incident reporting responsibilities.

13.2

Management of information security incidents and improvements

Responsibilities and procedures are required to manage incidents consistently and effectively, to implement continuous improvement (learning the lessons), and to collect forensic evidence.

Section 14: 

Business continuity management

This section describes the relationship between IT disaster recovery planning, business continuity management and contingency planning, ranging from analysis and documentation through to regular exercising/testing of the plans.  These controls are designed to minimize the impact of security incidents that happen despite the preventive controls noted elsewhere in the standard.

Section 15:  Compliance

15.1 

Compliance with legal requirements

The organization must comply with applicable legislation such as copyright, data protection,protection of financial data and other vital records, cryptography restrictions, rules of evidence etc.

15.2 

Compliance with security policies and standards, and technical compliance

Managers and system owners must ensure compliance with security policies and standards, for example through regular platform security reviews, penetration tests etc. undertaken by competent testers.

15.3 

Information systems audit considerations

Audits should be carefully planned to minimize disruption to operational systems. Powerful audit tools/facilities must also be protected against unauthorized use.

 

 

 


eReaders (the bigger picture)

With 2010 looking to be great year for the eReader I thought I would have a look at the some of the lets say “one that have not been released yet and the ones that are a bit different” to the standard eReaders that are on the market.

And also an underlining point is that apart from seeing which new technology is breaking through there is a serious note that is connected to the paperless office and the paperless system.

You will notice that the newer designs are at last (up to point) starting to design the product with the users perception in mind to how the user will perceive the usability of the product.

I have been trying to get this point over for some time know, (if you get a minute have a look at the social and cultural section of my blog)

Plastic Logic Que 

 

Developed by scientists at Cambridge University’s Cavendish Laboratory, Plastic Logic uses flexible plastic technology that has been in development for 10 years now. The company plans to introduce two different models of the Plastic Logic Que E-Reader: one with a price tag of $649 and featuring Bluetooth, Wi-Fi capability and 4 GB memory and another priced at $799 having Wi-Fi, 3G wireless and 8GB memory. Both models don’t have memory card slots. QUE is slated to be sold through Barnes and Noble’s retail stores.

Positioned as a paperless briefcase, Que is one of the largest e-readers in the market. Less than 1/3″ thick, Que has a width of 8.5″ and a length of 11″ with a weight of 17.2 ounces. Screen measures 10.7″ diagonally, with a display resolution of 960 x 1280 at 150 ppi. Strangely, it supports only 8 levels of greyscale in comparison to many of the newer e-book readers that support 16.

Apart from Plastic Logic affirming that the screen is shatterproof, a gesture-based captive touch screen is used for navigation with a virtual keyboard for taking notes. Plastic Logic has positioned the product for business professionals due to large screen and its support for Excel, Word, PowerPoint, and PDF functions.

It is quite similar to Kindle DX in that it allows you to read newspapers, periodicals, business documents, textbooks, and PDF files along with e-books and text files as well. AT&T will provide both 3G and Wi-Fi capabilities depending on the model you choose. And since AT&T also has a presence in other countries, there sure exists an opportunity for expansion, though for now, the device is going to be limited to within US shores only.

Many big Magazines and Retailers have signed partnership agreements with the Que such as USA TODAY, Wall Street Journal, The Los Angeles Times, Chicago Tribune, Baltimore Sun, the San Jose Mercury News, the Contra Costa Times, the Detroit Free Press, The Detroit News, the Oakland Tribune, the Huffington Post, The Sporting News Today, along with magazines from Barron’s, Fast Company, Forbes, MIT’s Technology Review, Popular Science, and IDG publication titles, including Macworld, PC World, CIO, Network World, and Computerworld.

The Que also reads a versatile amount of formats such as EPUB, PDF, HTML, Visio, RTF, DOC, DOCX, TXT, PPT, PPTX, XLS, XLSX.

This probably is the most expensive of the new generation of e-readers coming out. But it remains at the top of the heap next to the Skiff as two of the most innovative and versatile electronic readers to debut this years. If you have a large pocket book, the Skiff may be the right choice for you.

Skiff eReader

The Skiff E-Reader has a very generous display area, which stands at 11.5 inches with a resolution of 1200 x 1600 pixels. A stainless steel foil forms the base of the Skiff e-reader, which imparts a shatter-proof, crack-proof and a flexible characteristic to the device. Designed by LG Display, it incorporates touch screen features that can accept both finger and stylus input. The e-reader measure 9 inches x 11 inches and its thickness is just a shade over 1/4 inch. And at just over 17 1/2 ounces, the Skiff e-reader is lighter than the Kindle DX, which tips the scale at 18.9 ounces.

The Skiff will feature both Wi-Fi connectivity as well as 3G via Sprint. It is equipped with an internal memory that has a capacity of 4GB while the SD-card slot means, there is room for still more.

About its main source of content, what we know right now is that it is going to be the Skiff Store, which will look after the entire spectrum of selling and distributing newspapers, magazines, books, blogs and other content from multiple publishers across a range of devices. It is also likely that the newspapers and periodicals that is to be distributed by Skiff will also feature advertising, something that is lacking in Amazon’s Kindle versions and which the publishers will surely like to have included. Kindle newspapers also miss out on most of the photos, graphs, and so on. Skiff e-reader scores in this area also as their versions will have most of the graphics of the actual paper editions.

The Skiff as a unique design, it looks like to be the top of the class in far of a huge screen with tremendous resolution. We also like the fact the entire screen is touch screen, which means unlike the Kindle and other E-Readers it does not have a ton of buttons. Skiff has formed a relationship with Sprint and Samsung which means most Sprint stores will have this in stock, making purchase and discounts on the unit with a long term 3G package may lower the price drastically for citizens of the USA. The Price and release date have not been disclosed but rumours abound of a July Release date with a price tag of around $500.00

Hanlin V9 eReader

Compared to the Sony PRS-505, it’s definitely bigger. The V9 also adds new functions such as WiFi, CDMA/EVDO and handwriting that can help accessing e-books, newspapers, RSS and blogs through the Internet.

Supported file formats are the same as for the V3, including various open formats such as Epub and PPT. And language support covers almost every corner of the world.

The most intriguing thing is the effect of the A4 screen, allowing without zooming to display A4-sized PDF file almost as clear as on paper; only the font size may look a little small. With zoom-in (half page will be displayed on one screen), the font in turn is bigger than the original font of the paper.

The V9 also has a stylus; it realizes the click function, and allows making notes while reading. Otherwise, the software and hardware are about the same as for the V3.

According to Jinke, PVI can not yet mass-produce 9.7-inch displays. The MP is delayed until at least June; also the controller designed by E Ink still has a bug. Epson is busy with designing a new controller; the ASIC can be available in next month. The price is not set yet, probably somewhere between $599 and $699.

Entourage Edge

 

We are still trying to make our minds up on this one , is it a e reader or is it a note pad …..you decide !!!!!

 It does have two full screens on which actual work can be done

Can run Android applications and be used to browse the web

Wi-Fi built-in, so you’re not stuck relying on 3G

Two built-in microphones for noise-cancelation, but unfortunately no synchronization with notes

Note taking can be done using a stylus

Switching between the screens allows for websites to be loaded on one screen and “pushed” to the other

Just as with most other readers, you can highlight, annotate, and bookmark

It’s three whole pounds and ridiculously bulky

$500 price tag.

The Edge shows us what happens when you try to make a reader into what it’s not—a pseudo netbook or tablet

Final Thoughts

If these are the pointers to the future of the eReaders and we take a closer look at the skiff, and the overall concept with regards to the basic design, this has to be the one to watch, apart from totally new technology the overall reader frame work within it’s design parameters are far reaching than the other eReaders available on the market.

The reason why I say this is that it has been designed preciously for what the user has perceived it to do, no large back boards to the edge, no fancy button control on the bottom of the frame, it’s all touch technology and all you do is flick through each page of what you are reading, it not perfect in my view but it’s a step in the right direction. I still do not understand why designers over design new technology these days.

The days will come when after a hard days work or while you are at work and you want to read the daily paper situated in your region or even a national magazine all you do is subscribe to that publication and up it pops into your skiff or plastic logic Que and you read it, no fancy networking, no fancy gadgets, no nonsense frame work just clear and easy to read print that every one will want to read.  

One final reminder, if you want an e-reader that will allow you to read the books not only on the device you has now, but on any future devices you get. That is why it is important to buy an e-reader that uses the open source ePub format. Most of the top 5 eagerly anticipated E-Readers all read the ePub format.

If i said that these are a flop and will not hit our shops etc, well you will be right to say that, but flop or not i do think the skiff and also the Que will change the way we read well into the future. 

” backed by Hearst and Sprint it was a project doomed to failure, designed more as a proof-of-concept than an actual project ”

“Publishers need to think in terms of a podcast store for magazines instead of Hulu for magazines. You pay $15 and get a subscription. You get a memo when a new issues appears. You read it. You get on with your life. Anything else is far too much for a vast majority of us”

TechCruch

Could that be the Bigger Picture !!!!

 

 

 

 


Alternative to the mouse

I wrote an article some time ago about the end of the mouse as we know it, but what else could replace it Apple think it’s the track pad although I do not totally agree that this will replace the mouse.

 I generally believe that will be a short interim measure before all computers will be touch screen but it’s a step in the right direction.

It obvious that the likes of Apple are heading in this direction with the I phone and I pad completely multi-touch-based so there no requirement for the mouse

If this is the overall trend of apple surely people will follow?


Basics : Business Process Management

(BPM) is a management approach focused on aligning all aspects of an organization with the wants and needs of clients.

It is a holistic managemet approach that promotes business effectiveness and efficiency while striving for innovation, flexibility, and integration with technology.

Business process management attempts to improve processes continuously.

It could therefore be described as a “process optimization process.” It is argued that BPM enables organizations to be more efficient, more effective and more capable of change than a functionally focused, traditional hierarchical management approach.