Referencias | References


Referencias completas de vocabulario, eventos, crónicas, evidencias y otros contenidos utilizados en los proyectos relacionados con biotecnología y neurociencia de la KW Foundation.

Full references of vocabulary, events, chronicles, evidences and other contents used in KW Projects related to biotechnology and neuroscience.

Navegue por el glosario usando este índice.

Especial | A | B | C | D | E | F | G | H | I | J | K | L | M | N | Ñ | O | P | Q | R | S | T | U | V | W | X | Y | Z | TODAS

Página: (Anterior)   1  ...  4  5  6  7  8  9  10  11  12  13  ...  103  (Siguiente)
  TODAS

A

Logo KW

Assistant Robots [972]

de System Administrator - miércoles, 29 de octubre de 2014, 19:43
 

SERVICE ROBOTS WILL NOW ASSIST CUSTOMERS AT LOWE’S STORE

Written By: Jason Dorrier

Most folks don’t interact with robots in their daily lives, so unless you work in a factory, the tech can seem remote. But if you’re a San Jose local? Welcome to the future. Orchard Supply Hardware just hired a pair of bots to greet and engage customers.

Beginning this holiday season, the robots, dubbed OSHbot, will employ a suite of new technologies to field simple customer questions, identify items, search inventory, act as guides, and even summon Orchard Supply Hardware experts for a video chat.

OSHbot was developed in a collaboration between Orchard Supply Hardware’s parent company Lowe’sSingularity University Labs, and robotics startup Fellow Robots.

Corporate groups, like Lowe’s Innovation Labs, join Singularity University Labs to extend their horizons, get a feel for technologies in the pipeline, and strike up mutually beneficial partnerships with startups immersed in those technologies.

“Lowe’s Innovation Labs is here to build new technologies to solve consumer problems with uncommon partners,” says Kyle Nel, executive director of Lowe’s Innovation Labs. “We focus on making science fiction a reality.”

The five-foot-tall gleaming white OSHbot has two video monitors, two lasers for navigation and obstacle avoidance, a 3D scanner (akin to Kinect, we imagine), natural language processing, and a set of wheels to navigate the store.

 

Customers walk up to OSHbot and ask where they can find a particular item, or if they don’t know the item’s name, they can show it to the 3D scanner. OSHbot matches it up with inventory and autonomously leads the customer up the right aisle, using its onboard sensors to navigate the store and avoid obstacles.

As the robot works, it creates a digital map of its environment and compares that map to the store’s official inventory map. Of course, memorizing long lists and locations is a skill particularly well suited to machines, and something humans struggle to do.

But humans are still a key part of the experience.

If a customer has a more complicated question, perhaps advice on a home improvement project or a product comparison, OSHbot is equipped to wirelessly connect to experts at other Orchard Supply Hardware stores for live video chat.

The robot speaks multiple languages—witness its fine Spanish in the video—and we think its video interface might prove a great helper for hearing impaired customers.

 

OSHbot is indeed cool—but it isn’t the first service robot we’ve seen.

In 2012, we covered a Korean robot, FURO, that answered traveler questions in multiple languages and served as roving billboard in a Brazilian airport. Even further back, in 2010, we wrote about PAL robotics’ Rheem-H1 robot mall guide.

OSHbot isn’t the first service robot to employ autonomous navigation and obstacle avoidance either. Indeed, the RP-Vita robot, made by iRobot and InTouchHealth, is already traversing hospital hallways, connecting distant doctors with patients by video.

But OSHbot is significant for a few other reasons.

 

For one, it’s being adopted by Lowe’s, a big established firm in a sector of the economy—lumber, tools, and screws—you might not associate with robotics.

Lowe’s hiring robots is akin to office supply chain, Staples, announcing they’ll carry 3D printers or UPS stores offering 3D printing services to customers.

Just as 3D printing is doggedly entering the mainstream, so too is robotics.

Also, OSHbot ties together a number of technologies in a clever new package. That laser guidance system? It’s not so different from the tech used in Google’s self-driving cars. And 3D scanning? We’ve seen it in gaming, but recently it’s been miniaturized in Leap Motion’s infrared gesture controls or Google’s Project Tango.

When we first saw Project Tango smartphones with 3D scanning hardware, we speculated it wouldn’t be long before it appeared in robots. Indeed, one early adopter strapped a Tango smartphone to his drone. Now OSHbot is using similar tech to model and identify nails, screws, and tools in the hardware world.

And there’s room for improvement. Instead of a static creation, think of OSHbot as a kind of service platform on which its makers can hang other useful tech gadgetry.

 

Paired with 3D scanning capability, Marco Mascorro, CEO of Fellow Robots, suggests a future version might have a 3D printer to make parts on the spot.

We imagine other hardware might include a credit card scanner for checkout or NFC for mobile payments (think Apple Pay). It’d be just like those roving bands of Apple store employees with iPads—only, you know, with robots.

And why not add face detection software akin to RealEyes or IMRSV’s Cara?

These programs could allow the robot to gauge a customer’s attentiveness and even basic emotions. If the customer looks confused, the software would recognize the expression and ask if they need more specific help finding an item. Or perhaps the robot got it wrong, and they need to be guided to a different product altogether.

We think OSHbot has lots of potential—but it’s still a new creation.

The goal in San Jose is to put its potential to the test in the real world. There is no better way to find bugs in a system than daily interaction with the public. We expect there might be a few glitches (perhaps even comical ones). Voice recognition and natural language processing, for example, are vastly improved but still imperfect.

Also, the robot’s price tag will matter for wider adoption. Similar robots run into the tens of thousands of dollars, not including maintenance costs. But the trend in robotics has been rapidly falling prices—and a few (even pricey) robots might not only ease the burden on human employees, but attract a few new customers to boot.

Will OSHbot and other customer service robots increasingly make their way into our everyday lives? We think so. But fear not—they’re here to help.

Image Credit: Fellow Robots

This entry was posted in Artificial Intelligence,RoboticsTech and tagged Carafellow robots,fuRogoogleIMRSVkyle nelLeap Motionlowe's,lowes innovation labsmarco mascorroMicrosoft Kinectorchard supply hardwareOSHbotPAL roboticsProject Tangorealeyesretail robots,service robotssingularity universitysingularity university labs.

Link: http://singularityhub.com

Logo KW

AT&T [55]

de System Administrator - jueves, 2 de enero de 2014, 20:50
 

La American Telephone and Telegraph Corporation (AT&T: Corporación Estadounidense de Teléfono y Telégrafo) comenzó con el propósito de manejar la última red telefónica a larga distancia de los Estados Unidos (3 de marzo de 1885). Comenzando en Nueva York, la red se extendió a Chicago en 1892, y a San Francisco en 1915.

Fuente: http://es.wikipedia.org/wiki/AT&T

Logo KW

ATLAS ROBOT [843]

de System Administrator - domingo, 7 de septiembre de 2014, 19:56
 

ATLAS ROBOT SLAVES AWAY IN MIT LAB, HAULING METAL SCAFFOLDING FOR US HUMANS

Written By: Jason Dorrier

The humanoid robot, Atlas, stands six feet tall and weighs three hundred pounds. The bot is built like an NFL offensive lineman, only substitute muscle, ligament, and bone for steel and hydraulics—and swap speed and agility for slow and awkward.

Atlas is a work in progress.

Still, take a moment to be impressed. Atlas can balance and walk on two legs. It can navigate uneven surfaces, like a field of rubble, and right itself after taking a hard knock from the side. The robot comically does calisthenics and pushups.

Robotics pioneer Hans Moravec says of robots and artificial intelligence: The hard problems are easy and the easy problems hard. A robot with the motor skills of a human infant, then, is more impressive than one that plays chess.

And Atlas is evolving. Instead of simply walking around or making viral internet videos—the robot is continuously becoming more useful, which is, of course, the point.

A recent video shows (a slightly morose, if we do say so) Atlas hauling a heavy piece of metal scaffolding around the lab. Presumably, this isn’t as easy as it appears. The weighty metal unbalances the robot on one side making stability more difficult.

The DARPA-funded Atlas was developed by Boston Dynamics—one of eight firmssnapped up in Google’s 2013 robotics buying spree—but it has since been handed over to MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL).

CSAIL is improving the Atlas software to make it faster and more autonomous. And a hardware change is coming too. Atlas currently trails a cord for power. CSAIL aims to cut the cord sometime this year or next (with the help of Boston Dynamics)—replacing external power with an onboard power source so Atlas can roam free.

But never fear. Atlas is no Terminator…not yet at least. The robot is aimed at disaster recovery and hazardous situations humans ought best avoid. DARPA has supplied a number of teams competing in the DARPA Robotics Challenge with an Atlas bot.

The DRC was inspired by the Fukushima nuclear meltdown—the worst of which may have been avoided had a robot capable of human-like tasks (driving a vehicle, turning off a valve, opening a door) been able to enter the radioactive environment.

At the DRC trials last December, another Google acquisition Schaft (now self-funded) outscored the competition. The finals will take place next June in Pomona California.

From there? More robots acting more like humans, of course.

Image Credit: DARPA/Wikimedia Commons

This entry was posted in Robots and tagged ATLAS,atlas robotBoston Dynamicsdarpadarpa robotics challengegoogleGoogle roboticshans moravec,MIT CSAILschaftschaft robot.

Link: http://singularityhub.com

Logo KW

Atractor de Lorenz [1730]

de System Administrator - jueves, 23 de marzo de 2017, 11:21
 

El atractor de Lorenz, con valores r = 28, σ = 10, b = 8/3.

Atractor de Lorenz

Fuente: Wikipedia

El atractor de Lorenz, concepto introducido por Edward Lorenz en 1963, es un sistema dinámico determinista tridimensional no lineal derivado de las ecuaciones simplificadas de rollos de convección que se producen en las ecuaciones dinámicas de la atmósfera terrestre.

Para ciertos valores de los parámetros {\displaystyle a,b,c}, el sistema exhibe un comportamiento caótico y muestra lo que actualmente se llama un atractor extraño; esto fue probado por Albert W. Tucker en 2001. El atractor extraño en este caso es un fractal de dimensión de Hausdorff entre 2 y 3. Grassberger (1983) ha estimado la dimensión de Hausdorff en 2.06 ± 0.01 y la dimensión de correlación en 2.05 ± 0.01.

El sistema aparece en láseres, en generadores eléctricos y en determinadas ruedas de agua.1

{\displaystyle {\frac {dx}{dt}}=a(y-x)}
{\displaystyle {\frac {dy}{dt}}=x(b-z)-y}
{\displaystyle {\frac {dz}{dt}}=xy-cz}
donde a es llamado el Número de Prandtl y b se llama el número de Rayleigh.{\displaystyle a,b,c>0}, pero es usualmente {\displaystyle a=10}{\displaystyle c=8/3} y b es variado. El sistema exhibe un comportamiento caótico para {\displaystyle b=28} pero muestra órbitas periódicas para otros valores de b; por ejemplo, con {\displaystyle b=99.96} se convierte en un nudo tórico llamado T(3,2).

 

Proyección de un atractor de Lorenz tridimensional.

La forma de mariposa del atractor de Lorenz puede haber inspirado el nombre del efecto mariposa en la Teoría del Caos.

Véase también

Referencias

Bibliografía

  • Lorenz, E. N. (1963). «Deterministic nonperiodic flow». J. Atmos. Sci. 20 p. 130-141.
  • Frøyland, J., Alfsen, K. H. (1984). «Lyapunov-exponent spectra for the Lorenz model». Phys. Rev. A. 29 p. 2928–2931.
  • Strogatz, Steven H. (1994). Perseus publishing, ed. Nonlinear Systems and Chaos.
  • Jonas Bergman, Knots in the Lorentz system, Undergraduate thesis, Uppsala University 2004.
  • P. Grassberger and I. Procaccia (1983). «Measuring the strangeness of strange attractors». Physica D. 9 p. 189-208. 10.1016/0167-2789(83)90298-1.

Enlaces externos

Link: https://es.wikipedia.org

Logo KW

Attackers abuse legacy routing protocol to amplify distributed denial-of-service attacks [1278]

de System Administrator - viernes, 3 de julio de 2015, 14:50
 

Attackers abuse legacy routing protocol to amplify distributed denial-of-service attacks

By Lucian Constantin

Servers could be haunted by a ghost from the 1980s, as hackers have started abusing an obsolete routing protocol to launch distributed denial-of-service attacks.

DDoS attacks observed in May by the research team at Akamai abused home and small business (SOHO) routers that still support Routing Information Protocol version 1 (RIPv1). This protocol is designed to allow routers on small networks to exchange information about routes.

RIPv1 was first introduced in 1988 and was retired as an Internet standard in 1996 due to multiple deficiencies, including lack of authentication. These were addressed in RIP version 2, which is still in use today.

In the DDoS attacks seen by Akamai, which peaked at 12.8 gigabits per second, the attackers used about 500 SOHO routers that are still configured for RIPv1 in order to reflect and amplify their malicious traffic.

DDoS reflection is a technique that can be used to hide the real source of the attack, while amplification allows the attackers to increase the amount of traffic they can generate.

RIP allows a router to ask other routers for information stored in their routing tables. The problem is that the source IP (Internet Protocol) address of such a request can be spoofed, so the responding routers can be tricked to send their information to an IP address chosen by attackers—like the IP address of an intended victim.

This is a reflection attack because the victim will receive unsolicited traffic from abused routers, not directly from systems controlled by the attackers.

But there’s another important aspect to this technique: A typical RIPv1 request is 24-byte in size, but if the responses generated by abused routers are larger than that, attackers can generate more traffic they could otherwise do with the bandwidth at their disposal.

In the attacks observed by Akamai, the abused routers responded with multiple 504-byte payloads—in some cases 10—for every 24-byte query, achieving a 13,000 percent amplification.

Other protocols can also be exploited for DDoS reflection and amplification if servers are not configured correctly, including DNS (Domain Name System), mDNS (multicast DNS), NTP (Network Time Protocol) and SNMP (Simple Network Management Protocol).

The Akamai team scanned the Internet and found 53,693 devices that could be used for DDoS reflection using the RIPv1 protocol. Most of them were home and small business routers.

The researchers were able to determine the device make and model for more than 20,000 of them, because they also had their Web-based management interfaces exposed to the Internet.

Around 19,000 were Netopia 3000 and 2000 series DSL routers distributed by ISPs, primarily from the U.S., to their customers. AT&T had the largest concentration of these devices on its network—around 10,000—followed by BellSouth and MegaPath, each with 4,000.

More than 4,000 of the RIPv1 devices found by Akamai were ZTE ZXV10 ADSL modems and a few hundred were TP-Link TD-8xxx series routers.

While all of these devices can be used for DDoS reflection, not all of them are suitable for amplification. Many respond to RIPv1 queries with a single route, but the researchers identified 24,212 devices that offered at least an 83 percent amplification rate.

To avoid falling victim to RIPv1-based attacks, server owners should use access control lists to restrict Internet traffic on UDP source port 520, the Akamai researchers said in their report. Meanwhile, the owners of RIPv1-enabled devices should switch to RIPv2, restrict the protocol’s use to the internal network only or, if neither of those options is viable, use access control lists to restrict RIPv1 traffic only to neighboring routers.

Link: http://www.networkworld.com

Logo KW

Auditoría de seguridad avanzada para redes [955]

de System Administrator - lunes, 20 de octubre de 2014, 14:24
 

Cómo realizar una auditoría de seguridad avanzada para redes

por Kevin Beaver

En los últimos años, las redes empresariales han evolucionado considerablemente. Todo, desde el cómputo móvil hasta la nube –y por no hablar de todos los sistemas internos nuevos, servicios y aplicaciones– están haciendo a las redes actuales más complejas que nunca. Incluso las mismas herramientas que se utilizan para administrar la seguridad de la red pueden expandir la superficie de ataque y crear sus propias vulnerabilidades.

Como muchos usuarios a menudo averiguan por la vía difícil, la complejidad es mala para la seguridad, pero continúa sin cesar.

Uno de los desafíos centrales que enfrentan las empresas hoy es no saber, en un momento dado, dónde se encuentran realmente las cosas con sus vulnerabilidades de red y los riesgos del negocio. Si una empresa va a realizar mejoras tangibles en la seguridad, tiene que tomar sus pruebas de seguridad de red al siguiente nivel. En este consejo, voy a explicar cómo empezar.

Iniciando una auditoría de seguridad de red de siguiente generación

En primer lugar, es importante recordar las diferencias entre las auditorías de seguridad, los análisis de vulnerabilidades, las pruebas de penetración y las evaluaciones de riesgos de la información. Hay similitudes entre todos ellos –a saber, encontrar y corregir los fallos de seguridad de la red antes de que sean explotados–, pero los enfoques, herramientas, conjuntos de habilidades y el tiempo requeridos para cada uno varían considerablemente.

Lo más importante que se debe entender con las auditorías de seguridad es qué es lo que su empresa está tratando de lograr. No le decimos a nuestros radiólogos e inspectores de viviendas que limiten su alcance sobre la base de lo que suponemos que necesitamos; ¿por qué limitar el foco de las pruebas de seguridad de la red a una sola cosa, como penetrar en la red desde el exterior, escanear una página web por el cumplimiento de PCI DSS, validar que se está llevando a cabo el ingreso a la auditoría y la colocación de parches, o asegurar la existencia de políticas documentadas? Se justifica una combinación de todos los métodos de pruebas tradicionales; yo lo llamo una "evaluación de seguridad." Y a través de la exploración, el análisis manual, los tutoriales físicos y entrevistas, he encontrado que este es el mejor enfoque.

Una ley fundamental de la seguridad de red es que usted no puede asegurar lo que no reconoce. Antes de que una organización pueda afirmar verdaderamente qué tan seguro es su entorno, debe estar segura de que está mirando todas las áreas correctas –y que lo está haciendo de manera periódica y constante. Esto no significa que la empresa tiene que ver cada uno de los sistemas, en cada segmento de la red, en todo momento, pero sí que debe centrarse en lo que es más importante y más visible. En otras palabras, como mínimo, mire la información más sensible sobre los sistemas más críticos y resuélvalo desde allí. Si eventualmente es capaz de evaluar la seguridad de todos los sistemas y aplicaciones –tanto internos como externos a la red– eso es genial. Después de todo, si tiene una dirección IP, una dirección URL o –dadas las cosas en estos días– un interruptor de encendido/apagado, probablemente es un blanco legítimo para atacar.

Herramientas del oficio

Con el fin de obtener una imagen real de la seguridad, deje de depender de los análisis básicos de puertos y vulnerabilidades. El negocio tiene que estar dispuesto a invertir en herramientas que le permiten excavar más, lo que requerirá las siguientes herramientas:

  • Analizadores de red que pueden encontrar anomalías en el protocolo, el sistema y el usuario/host.
  • Crackers de contraseña y cifrado que ponen a prueba la seguridad de los sistemas operativos, dispositivos móviles y encriptación completa de disco.
  • Herramientas de búsqueda de información con identificación personal que pueden encontrar archivos asegurados en forma incorrecta en recursos compartidos de red y computadoras portátiles sin encriptar.
  • Inyector de SQL y herramientas de proxy para pruebas de aplicaciones web de mayor profundidad.
  • Escáneres de base de datos que buscan bases de datos en vivo que no están contabilizadas.
  • Analizadores de base de reglas de firewall, que permiten descubrir fallas de red básica que podrían ser difícil encontrar de otra manera.
  • Analizadores de código fuente para descubrir problemas que acechan en la web y aplicaciones móviles.
  • Herramientas de explotación para demostrar lo que puede suceder cuando se descubren ciertas fallas.

Antes de empezar

Planificar las cosas con mucha antelación es fundamental para una buena prueba de seguridad. Eso establece las expectativas de todos los involucrados, incluyendo la administración, los desarrolladores y el personal de operaciones de TI. Estas son las principales áreas para atender:

  • ¿Quién es el patrocinador de la prueba? ¿Quién llevará a cabo las pruebas?
  • ¿Qué se va a probar?
  •   (Es decir: interna, externa, con o sin autenticación de usuario)
  • ¿Cuándo será probado?
  • ¿Se requiere análisis manual? (La dependencia periódica en los análisis automatizados está bien, pero la dependencia total sin realizar nunca un análisis manual es peligrosa, aunque demasiado común)
  • ¿Alrededor de cuánto tiempo va a tomar la prueba? (Será más larga de lo que piensa, sobre todo cuando se involucra el escaneo web)
  • ¿Se proveerá información completa del sistema o será una prueba a ciegas? (Yo prefiero la primera para asegurar un alcance definitivo y que nada se pasa por alto)
  • ¿Cuál es su plan de contingencia en caso de un problema, como la negación de servicio a la red o un escáner de vulnerabilidades web que rellena una base de datos de producción?

Ejecución de las pruebas

Puede tomar todo un libro para cubrir esta fase de las auditorías de seguridad de red, pero aquí hay cuatro subfases que su empresa querrá ejecutar:

  1. Reconocimiento. Para determinar cuáles sistemas, aplicaciones, personas/procesos, etc. deben ser analizados.

  2. Enumeración. Para ver qué se está ejecutando dónde, para que usted pueda desarrollar un plan de ataque.

  3. Descubrimiento de vulnerabilidades. Para descubrir fallas específicas, tales como contraseñas débiles, inyección SQL y actualizaciones de software que faltan.

  4. Demostración de vulnerabilidad. Para mostrar la importancia de las vulnerabilidades que usted encuentra y cómo importan en el contexto de su entorno de red y/o negocio.

Una vez más, realizar un análisis manual es una parte grande y muy importante de las pruebas de seguridad. Un mono puede ejecutar un escáner de vulnerabilidad; el valor real viene cuando usted utiliza su sabiduría y sentido común para descubrir y explotar las fallas que requieren de intervención humana.

Construcción de un informe eficaz

En esta etapa, el informe que usted construye esboza dónde y cómo se hacen las cosas; sin embargo, este paso generalmente no es tomado tan en serio como debería ser. Incluso si se descubre todas las mayores brechas de seguridad y exploits, si estos riesgos no se comunican bien a los demás dentro de la organización, entonces probablemente no se actuará respecto a ellos y el ciclo de brechas de seguridad continuará.

Desde mi propia experiencia, he encontrado que un informe oficial que contiene tanto un resumen ejecutivo informativo (es decir, no solo un par de frases de pelusa), como una lista de los detalles técnicos de cada hallazgo crítico y no crítico funciona bien; cuanto más breve, mejor. Nunca entregue informes exportados de las herramientas de pruebas de seguridad y espere que otros tomen en serio el informe.

Cualquiera que lea el informe final tiene que saber tres cosas básicas:

  1. Cuáles son los hallazgos.
  2. Dónde están presentes.
  3. Qué se puede hacer al respecto.

Incluso con capturas de pantalla y otros detalles técnicos, a menudo se puede enumerar dos o tres conclusiones en una sola página del informe. Tenga en cuenta que cuanto más detallado sea el informe, mayores serán las posibilidades de que algo sea pasado por alto. Remita a un apéndice, datos de prueba suplementarios (por ejemplo, reportes en PDF o HTML de las herramientas que utilizó) o sitios web, siempre que sea posible.

Su tiempo y su conocimiento son todo lo que tiene. Las empresas dependen en gran medida de los resultados de las evaluaciones de seguridad de red, por lo que las mejoras continuas son una necesidad. A veces se trata de sus herramientas, a veces es su metodología, pero a menudo es solo una cuestión de mejorar en lo que hace. Teniendo en cuenta todas las evaluaciones que realizo cada año, me he dado cuenta que si usted afina su enfoque hacia las pruebas de seguridad, puede obtener resultados mucho mejores en un período de tiempo más corto –incluso con toda la complejidad presente en las redes actuales.

Sobre el autor: Kevin Beaver es un consultor de seguridad de la información, escritor, profesional, vocero y testigo experto de Principle Logic LLC. Con más de 25 años de experiencia en la industria, Kevin se especializa en la realización de evaluaciones independientes de vulnerabilidades de seguridad en los sistemas de red, así como en web y aplicaciones móviles. Es autor/coautor de 11 libros sobre seguridad de la información, incluyendo el best-seller “Hacking For Dummies” y “Guía Práctica de Privacidad HIPAA y Cumplimiento de Seguridad”. Además, es el creador de los audiolibros y blog de seguridad de la información “Security On Wheels”, que ofrecen aprendizaje de seguridad para profesionales de TI sobre la marcha. Puede encontrarlo en su página web www.principlelogic.com y seguirlo en Twitter:@kevinbeaver.

Logo KW

Augmented And Virtual Reality To Hit $150 Billion, Disrupting Mobile By 2020 [1192]

de System Administrator - lunes, 6 de abril de 2015, 19:04
 

Augmented And Virtual Reality To Hit $150 Billion, Disrupting Mobile By 2020

Editor’s note: Tim Merel is the managing director of Digi-Capital.

Virtual reality and augmented reality are exciting – Google Glass coming and going, Facebook’s $2 billion for Oculus, Google’s $542 million into Magic Leap, not to mention Microsoft’s HoloLens. There are amazing early-stage platforms and apps, but VR/AR in 2015 feels a bit like the smartphone market before the iPhone. We’re waiting for someone to say “One more thing…” in a way that has everyone thinking “so that’s where the market’s going!”

A pure quantitative analysis of the VR/AR market today is challenging, because there’s not much of a track record to analyze yet. We’ll discuss methodology below, but this analysis is based on how VR/AR could grow new markets and cannibalize existing ones after the market really gets going next year.

AR is from Mars, VR is from Venus

VR and AR headsets both provide stereo 3D high-definition video and audio, but there’s a big difference. VR is closed and fully immersive, while AR is open and partly immersive – you can see through and around it. Where VR puts users inside virtual worlds, immersing them, AR puts virtual things into users’ real worlds, augmenting them.

You might think this distinction is splitting hairs, but that difference could give AR the edge over not just VR, but the entire smartphone and tablet market. There are major implications for Apple, Google, Microsoft, Facebook and others.

Where’s the beef?

VR is great for games and 3D films – that’s what it was designed for. However it is primarily a living room, office or seated experience, as you might bump into things if you walked down the street wearing a closed headset. It’s still a great technology with a ready and waiting user base of tens of millions among console, PC and MMO gamers, those who prefer 3D to 2D films, as well as niche enterprise users (e.g. medical, military, education). This has attracted a growing apps/games ecosystem around early players like Unity, Valve, Razer and others.

AR is great fun for games, but maybe not as much fun as VR when true immersion is required – think mobile versus console games. But that possible weakness for gamers is exactly why AR has the potential to play the same role in our lives as mobile phones with hundreds of millions of users. You could wear it anywhere and do anything. Where VR is like wearing a console on your face (Oculus), AR is like wearing a transparent mobile phone on it (Magic Leap, HoloLens).

Eye phone

AR could play a similar role to mobile across sectors, as well as a host of uses nobody has thought of yet. The sort of things you might do with AR include a-commerce (we just invented a new cousin to e-commerce and m-commerce), voice calls, web browsing, film/TV streaming in plain old 2D as well as 3D, enterprise apps, advertising, consumer apps, games and theme park rides. So while games feature prominently in most AR demos, they are only one of a multitude of potential uses for AR. See full analysis by sector here.

Real dollars

We forecast that AR/VR could hit $150 billion revenue by 2020, with AR taking the lion’s share around $120 billion and VR at $30 billion.

So where do these big numbers come from?

We think VR’s addressable market is primarily core games and 3D films, plus niche enterprise users. VR could have tens of millions of users, with hardware price points similar to console. We anticipate consumer software/services economics similar to current games, films and theme parks, but don’t expect substantial additional data or voice revenues from VR. There could be meaningful enterprise VR revenues, but we think that AR could take more of that market.

We think AR’s addressable market is similar to the smartphone/tablet market. So AR could have hundreds of millions of users, with hardware price points similar to smartphones and tablets. This could drive large hardware revenues for device makers.

AR software and services could have similar economics to today’s mobile market, as they both cannibalize and grow it. A large AR user base would be a major revenue source for TV/film, enterprise, advertising, and consumer apps from Facebook to Uber to Clash of Clans. Amazon and Alibaba would have an entirely new platform for selling to a mass audience. Together with innovative applications nobody has thought of yet, AR’s scale could prove a bonanza for mobile networks’ voice and data businesses. Someone has to pay for all that mobile data.

The sector forecasts by market from 2016 are covered in detail here, and below is what the market could look like in 2020. Between now and then we’ll be refining regularly as more data becomes available, and expect a lot of debate about where the market is headed.

Vomit reality and Glassholes

It’s not all virtual beer and Skittles, as some VR applications give people motion sickness, and the privacy questions surrounding Google Glass raised a lot of scrutiny. So there are both technical and social issues to resolve as both markets become real.

One more thing…

From the perspective of current giants, there are pluses and minuses. Facebook placed an early bet on Oculus, which might win VR but not address the larger AR market. Google learned from Glass, and had the foresight to invest in Magic Leap. HoloLens could allow Microsoft to regain the glory it lost to Apple in the last decade. And Apple? We would love to see an augmented “One more thing…”

The full analysis is here.

Logo KW

Augmented reality could improve postal operations, says report [1198]

de System Administrator - sábado, 11 de abril de 2015, 20:29
 

Augmented reality could improve postal operations, says report

Logo KW

Augmented Reality, Not VR, Will Be the Big Winner for Business [1691]

de System Administrator - sábado, 9 de abril de 2016, 18:04
 

Augmented Reality, Not VR, Will Be the Big Winner for Business

By Marc Prosser

Sometimes exponential technologies hide in plain sight. Their innovation speed, market size, and number of practical uses seem to be progressing linearly, until suddenly they tilt upwards and turn on the boosters.

A case can be made that augmented reality (AR) in enterprises is just such an exponential technology. A growing number of companies are busy developing and releasing AR systems for enterprise settings.

Augmented and virtual reality analyst Digi-Capital’s numbers give a good indication of just how big AR is expected to be in a few short years. According to Digi-Capital AR companies will generate $120 billion in revenue by 2020, compared to the $30 billion revenue expected for their ‘cousin’ companies in virtual reality.

Part of AR’s explosive growth can be traced to a wide array of uses in business settings. The tech is a fundamental component in the hardware and software revolution, known as Factory 4.0.

 augmented-reality-big-business-31

First Systems Are Go

While virtual reality is about creating closed, fully immersive digital experiences, augmented reality systems overlay sensory information, such as visuals and sounds, on the real world around you.

The best-known example is Google Glass—a kind of partial AR experience where a square display appears in a user’s field of view. The device never became the success with end-users that Google was hoping for.

However, with 20-20 hindsight (if you’ll pardon the terrible pun) Google Glass was partly responsible for kickstarting a wave of innovative new AR startups. Unlike Google, these companies focused solely on AR’s potential for enterprises.

One example is the Canadian company NGrain, whose solutions have been implemented in several major companies, including Lockheed Martin and Boeing.

Lockheed has used AR systems in relation to its F-35 and F-22 aircraft.

Using smart glasses or tablets, engineers and service personnel can overlay graphics that show data like maintenance records or assembly instructions on top of a piece of real-world equipment. The system can also compare a digital 3D model of an aircraft with an actual aircraft to identify any potential damage.

The introduction of AR let Lockheed Martin engineers work up to 30 percent faster.

Meanwhile, at Boeing, several teams are looking at using AR systems to perform running quality control of parts for several aircraft, including the 787 Dreamliner. AR systems also allow maintenance crews to carry out full airplane checks much quicker than was previously possible.

“Traditionally, these tasks are carried out consulting manuals and using paper and pen,” says Barry Po, director of product management at NGrain. “Using AR-systems lets you overlay any needed information, while you have both hands free, and our visual inspection and damage assessment software can make it much quicker to identify potential issues. The result is that the time it takes to do a full plane check can go from several days to a matter of hours.”

Other AR systems have been used to deliver on the job training.

Using images and instructional illustrations and video, augmented reality units can show a new employee how to complete a job task without needing an introduction course.

Further, data has shown workers using AR technology learn up to 95% quicker and tend to make fewer mistakes than workers trained using traditional methods.

Pipes Are Being Laid to Drive Broader Adoption

While AR in enterprises has shown impressive results, most of these come from initial pilot projects, using a limited number of devices.

AR is also facing a number of challenges, including a lack of industry standards which can make integrating AR units and software within current enterprise IT ecosystems difficult.

“Traditional software systems like ERP or WMS are not necessarily ready to integrate fully with the new technologies, like AR, that make up Factory 4.0,” Pete Wassel, CEO of Augmate, says.

AR companies have often run successful trials, instigated by a company CTO, but then hit a wall when attempting a full rollout.

Enterprise IT departments have often — and often understandably so — balked at the idea of introducing camera-equipped AR units that come with a host of potential security risks and integration headaches.

It is a situation that Augmate, along with other companies, has been working to solve.

Augmate is creating the backbone, or pipe systems, that make integration of AR into existing IT ecosystems smooth and safe. Its software systems have generated a lot of interest, not only within the AR industry, but also from individual enterprises and companies within the Internet of Things space.

AR’s Stealth Mode About to End

Enterprises are quickly becoming aware of the potential of AR, with two-thirds of companies recently interviewed by Tech Pro Research saying they were considering integrating AR solutions.

At the same time, the number of use case scenarios for AR is growing rapidly.

Training, maintenance, warehouse management, emergency response at breakdowns, co-worker location, damage assessment, work order creation, assembly product design, and marketing and sales are all being augmented.

The same goes for industry-specific tasks in a number of fields.

For example, in health care AR can assist with information during surgery, medical inspections, in relation to specific medical procedures, or simply to call up and immediately display a patient’s relevant medical history hands-free on a pair of smart glasses.

One of the biggest use cases across industries is remote maintenance and inspection. Using AR systems, experts will be able to give advice to on-site personnel in any of a number of situations. This would not only eliminate having to fly key personnel around the world but dramatically improve response times.

“It makes it possible to create what I call ‘John Madden’ guides, where experts are able to draw instructions and point things out in real time,” Pete Wassel says.

Companies and startups have been working on AR solutions for many of these specific tasks, and many are nearing full release, after spending time in either beta or stealth mode.

At the same time, the hardware capabilities— field of vision, battery time, sturdiness, and ease of use — of AR devices are improving rapidly. Also, motion sensor and eye tracking technology are improving, allowing for more hands-free use.

In short, it is a perfect scenario for rapid growth in enterprise AR.

A Future Beyond the Factory

While the coming years are likely to see the use of AR technology in enterprises explode — its enterprise heyday will likely end when it’s supplanted by another exponential technology.

“Technology moves in cycles. I would think that AR in enterprises will have a good run of maybe 15 years,” Pete Wassel says. “After that, robots and AI will start to outcompete human workers and become the new dominant exponential technologies in enterprises.”

 right-click-reality

But by then, it will have likely diffused beyond enterprises and become part of our daily lives.

As a species, we build knowledge on what was discovered by previous generations. We quickly realized it was impractical to rely on memory alone to do this, so we invented the printed word.

Our accumulated knowledge grew to lexical levels and then to whole libraries. Computers and the Internet are, of course, powerful new methods of storing and recalling information.

Each iteration increases the amount of information stored and makes it more readily accessible.

Augmented reality looks like another step, seamlessly integrating the physical world with our stores of information. Imagine having the ability to call up information about or perform a range of other actions on every object around you through a layer of AR.

This is the true promise of AR beyond its near-term enterprise sweet spot.

The ability to right-click on reality.

Marc Prosser 

Marc is British, Danish, Geekish, Bookish, Sportish, and loves anything in the world that goes 'booiingg'. He is a freelance journalist and researcher living in Tokyo and writes about all things science and tech. Follow Marc on Twitter (@wokattack1).

Image credit: Shutterstock.com

Link: http://singularityhub.com

 

Logo KW

Austin Powers [337]

de System Administrator - lunes, 3 de febrero de 2014, 17:06
 

 Austin Powers

Sir Austin Danger PowersKBE, (n. 12 de noviembre de 1939) es un espía británico creado e interpretado por Mike Myers, es el protagonista de la trilogía de películas: Austin Powers: International Man of MysteryAustin Powers: The Spy who Shagged me y Austin Powers in Goldmember.

Fuente: http://es.wikipedia.org/wiki/Austin_Powers_(personaje)


Página: (Anterior)   1  ...  4  5  6  7  8  9  10  11  12  13  ...  103  (Siguiente)
  TODAS