, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,



Mobile Devices & Technology

Quantum Computers


The Future


Disruptive Innovations

Mobile Communication & Technology

HD Voice




Wireless Devices





Health Care







Mobile Devices & Technology

This writing is primarily on Mobile Devices, Communication and Technology but will also speak to some tangential areas as well.

Technology is on an ever increasing slope, right now it seems to be on a parabolic slope and not a gradual linear slope. But it is maybe, just maybe, not on an exponential growth curve yet – some of the brighter technology scientists out there can produce evidence for or against that….

Technology in many areas will become better, there is no doubt of that because someone in some country will see to that and come up with a brilliant, more intuitive tech that anyone can use anywhere at any time.

Quantum Computers

The primary problem will be one of security, in ensuring that your privately personal data is not compromised or gleaned from whatever device you are using in any setting. Several years ago, I have talked about the growth of Quantum Computers (QC) and what they will mean for creating more secure systems as well as allowing criminals (those that can get their hands on a one) to break security (passwords, passphrases and pass codes). QCs are capable, as it has been discussed, of performing trillions of operations per second, check out this one article to read up on them [1]. While true QCs are not yet here, work is progressing, including the NSA QC project that has been reported [2].


As it is, some of the world’s fastest computers just continue to gain in the number of operations per second for processing power [3], see the top five June 2014 powerhouses:

Agency/Nation                        Computer system         Cores         PFlop/s

National Super Computer Center 

China                                        Tianhe-2 (MilkyWay-2) 3,120,000     33.86

DOE/SC/Oak Ridge National Lab        

U.S.                                          Titan – Cray XK7               560,640   17.59


U.S.                                          Sequoia – BlueGene/Q    1,572,864    17.17


Japan                                         K computer, SPARC64      705,024    10.51

DOE/SC/Argonne National Lab (IBM)

U.S.                                           IBM Mira – BlueGene/Q      786,432     8.587

The point about QCs and supercomputers is that all the other devices you will use down the road will also benefit from ongoing research in QCs and Supercomputers. Your devices, those you purchase in the future will continue growing in processing power to handle all the wants and needs of the various buying audience levels – for better device graphics (think 3D), video calls, movies, calculations for work, school and even on the spot health care computing for health care professionals (CDC, WHO and others) who might have a need to run genetic and/or virus simulations during emergencies.

We just have to worry about implementing better: encryption techniques to protect our data (personal or business) and compression schemes to move larger sets of data across the Internet (‘Net), wirelessly or even via cellular traffic.

The Future

People everywhere are going to have to learn to be better and desire to be better in all their everyday activities.

It is also because everyday activities for:

  • Health (tracking calories, cholesterol, miles walked),
  • Health care (having doctor visits via a smart device),
  • Banking,
  • Dating (yep, dating),
  • Becoming adventurous (researching foreign places to visit),
  • Learning a new job or becoming better at your current job,
  • and more

is only going to get better and easier and faster and more economical. This is not simple pie-in-the-sky thinking, this is all going to come to fruition in various forms.

People everywhere, from the furthest remote areas of a country to the densest urban setting will have an opportunity to become better through the continued growth of mobile technology and mobile communication.

Tech costs for all forms of devices are still coming down, enabling more people to enjoy mobile computing usage. The costs of computer memory and storage is still declining and becoming better. This is due to technology such as Solid State Drives (SSD), which is quiet, consumes less power, produces less computer heat but allows for faster data access on a device. SSDs are becoming much more affordable than several years ago.

Another type of computer memory called ‘memristor’ is continuing to catch on with HP touting it as a major component of their next big computer design [4]. Memristors will allow for the advancement of handling the ever increasing speed and processing demand of computers and data usage and with that being the case for computers (desktop, laptop), we’re likely to see it in cloud computing, mobile computing devices and smart phones at some point. That is, if HP and other companies succeed with making memristor storage a reality…


The future is bright and dark for employees but very challenging for businesses worldwide. It is bright for employees because more employees continue to bring their own mobile devices to work to use for various reasons. Bring Your Own Device; Bring Your Own Computer; Mobile Device Management; etc., etc., etc.

It is dark for employees because not all firms are going to allow all known mobile devices to connect to the firm’s network. Employees should understand this going in that it is not a “Have it your way” situation.

It is challenging for businesses because when they allow employees to bring in their own (or are not aware of) disparate devices, those devices can create havoc in the enterprise. That havoc can come in the form of:

  • The introduction of malware into the network, brought from home or picked up in coffee shop
  • Employees wanting the businesses’ support staff to update or trouble problems on the employee’s personal device – in light of the many dozens of devices smartphones and dozens of tablets out there from the past decade – an unstainable climate
  • Employees can take proprietary data home by copying it to the mobile device

However, the bright side for businesses is that with MDM and MAM the company or enterprise can use that MDM/MAM software to better manage the latest versions of the different smartphone OS’s and applications. This would presuppose that businesses inform their employees that the firm will ‘only’ work with, for example, the latest iOS or Android (i.e. v4.2 and greater and not v3.x or lower) OSs.

Disruptive Innovations…

While disruptive and revolutionary innovations are a good thing, we cannot discount the linear growth of evolutionary innovation; it still helps with growth in many areas. Not everything we put our hands on is going to see revolutionary or disruptive innovation or growth and we need to realize that. Yes, it would be nice to have disruptive tech innovation at every turn but not everyone is going to be able to handle or deal with it. And I do not mean just the older generation but people from all age groups and walks of life.

There will be people who have medical (physical or mental) conditions that will prevent them from readily engaging in grabbing on to the newest iteration of some whiz-bang product X, they just not have the cognitive skill set to do so or are limited by a physiological impediment.

We do need disruption and revolutionary growth in some fields that will allow for exponential growth. Take our Ebola problem for example, which is spreading by the day. We could use some brilliant epidemiologist or virologist to figure out some technological method to tackle and overcome Ebola faster rather than sooner whether they are using a Cray supercomputer or a very powerful handheld mobile device. Using plant based research takes far too long, that research needs to be done via computing modeling…

In order to gain these disruptive/revolutionary innovative changes we have got to come up with more technological strategies with aggressive timelines to overcome some of the many hurdles facing us today, such as Ebola.

Mobile Communication & Technology

I have written about this before, though not extensively but it bears mentioning again. This is an area where we have got to gain even more disruptive and revolutionary growth rather than staid old evolutionary (linear) growth.

Wireless bandwidth will need to see continual improvement and grooming to handle the vast expansion of devices and the growth in the number of people communicating wirelessly. Imagine all of the new vehicles coming online that enables more drivers the capability to use their phones (cellular and then via Bluetooth) to have conversations while driving (even though many of these drivers should focus on driving first and not talking).

Hurdles such as wireless attenuation (poor or dropping signal strength), congestion (or unavailable bandwidth), latency (voice/data delays) and dropped calls will need to be tamed in order for everyone to enjoy smooth conversations and flicker free data downloads or watching videos. Employing more femtocells (or small cell) devices [5] in more locations (homes, businesses, bus stops, hotels, etc.) will aid in reducing bandwidth. These femtocell devices with their reduced size, costs and increasing functionality currently allows for reduction in bandwidth congestion and stopping the annoying error signal of no bandwidth available to make your call.

The order of items in this section is not indicative of any specific priority.

HD Voice

HD Voice is a growth area but it is not revolutionary, however, it is still a necessary improvement. While Verizon is starting to implement HD voice (so callers can hear a truer quality of the other person speaking and vice versa), other telephone companies have already done so.

HD Voice will make more conversations an enjoyable experience, the snag is – people will have to have newer smart phones that can handle the downloaded software upgrade to enable HD quality voice calls.


Whether many people like it or not, V2V wireless communication is going to occur very soon in our lifetime. This is where cars, buses, trucks, ambulances, fire trucks, etc., talk to each in order to minimize and/or avoid vehicle collisions.


Vehicle to Infrastructure communication is another seemingly hot little item, which will be as beneficial as V2V. Stop lights will communicate with vehicles and better manage the ever increasing logjams and flow of traffic. Emergency vehicles can manage the stop light system better than it currently can today – more green lights for them and red lights for the cross streets – in advance of the emergency vehicle getting to the intersection.

Road conditions, if the roads are equipped with V2I connected components, can be transmitted to stop lights and all vehicles, helping the drivers to drive at a safer speed in worsening weather conditions. Or, sensors in the road can alert the various Dept of Transportation offices as to the state of the road condition.


All mobile computing devices and communication methodologies will have to include some very, very serious security measures in place to prevent many, if not all, of the many current hacks and future hacks that use Bluetooth or Wireless communication.

With more and more people around the world moving to mobile communication and using “the Cloud” for storing and sharing precious content, we must come up with more means to protect this data.

We must have:

  • Easily employable encryption to ensure unauthorized individuals cannot just pilfer and ‘see’ your data
  • Better authentication methods to enable ONLY the owner or allowed guest to access content and then ONLY for the allowed level of access – some companies are trying, i.e. Apple with their iPhone fingerprint identifier, which was promptly broken – albeit by individuals who had access to very powerful computers to aid in breaking that fingerprint scheme
  • Better ability to lock/wipe smart phones, California now requires vendors to install this capability on all new smart phones

The criminal element will continue to attempt to exploit all of these smart devices (see Wireless Devices) you own. “You” have to do a better job of securing the devices you own – changing all default userids and passwords and making those passwords/passphrases/passcodes complex enough so the aberrant malcontent cannot break your cute password in a couple of minutes (or less). In the same vein, vendors of mobile/smart devices “must” build in better security measures from the initial stages of device creation, something like forcing new device owners to create new userids and better/stronger passwords (not just a simple 3 or 4 number one) as well as in:

  • Preventing buffer overflows [6], which have been known since 1972 with the first ‘known’ exploit in 1988 to harm a computer or
  • Stopping SQL injection [7] attacks and
  • Producing better OSs that perform significantly better at sandboxing malware or using virtualized operating environments that recognize and kill off that malware (as we have known for several years, malware signature detection by itself is not good enough).

Wireless Devices

The future looks promising, not just “pie-in-the-sky” type hyperbole but in actual helpful and beneficial uses. There is a continual growth of portable/mobile devices employing wireless communication, such as a few of the connected devices in use today:

  • Baby monitors with or without cameras
  • Baby monitors that transmit to your smartphone
  • Smart TVs to connect to the ‘Net
  • Indoor and outdoor house lights controlled by computer or smart device
  • Electricity usage – devices in the home, business talk to the home central controller
  • Wearables for health and pleasure
  • Dishwasher, dryer, washer, stove, fridge, microwave, etc.
  • DVR / DVD players
  • Game consoles, Cameras
  • Vehicles – mentioned above in V2V & V2I, you will be able to talk to your car from your smart device from any location
  • Sensors – home security, water flooding, gas leak, etc.
  • Workplaces – employees will / should be able to become more productive throughout their place of employment as well as supervisors and managers being able to call up data at any location in the business
  • Security – cameras, alarms and monitors will keep on helping security make the workplace security


This is called the Internet of Things and People where we have so much connectivity, using IPv4 and IPv6 communicating wirelessly, over the ‘Net.

There will be connectivity for everything that can hold an RFID chip or some kind of computer. Remember, we do not require a full blown computer or computing device to use a CPU.

This section is here precisely because the IoT and People are becoming more intertwined as to functionality, desires and needs. People will use more wearable technology, especially as they continue to improve in use, performance and price points.

The hurdle here is that no one wants to carry around multiple mobile devices when one or two devices that “can perform admirably” will suffice – but we are getting there.


During emergencies, having great mobile devices and communication technology at hand will allow for better and faster emergency member/team interactions. Strategies and tactics can be drawn up or modified on the fly since all members or key members in each team will have a mobile/portable device at hand.

These mobile devices to come will have better batteries (see Efficiencies ) and have wireless communication bandwidth to ensure continual uptime for voice and image displays as well as in handling large data transfers (pictures, video) and not to forget, GPS locating features.

With their mobile tech and comms, emergency team members will be able to, in varying emergency situations (tornadoes, floods, fires, etc.), more efficiently plan and perform “what if” type scenarios to handle the:

  • Varying loads of People,
  • Amount of Food required, calculating in the differing ages of victims,
  • Water and Waste disposal requirements and
  • Best places to Position all of this material.


We will see more efficiencies coming on line aid in having better mobile communication and tech.

  • Batteries – lithium ion tech improving – look at Tesla and Panasonic teaming up to build their ‘Gigafactory’ to produce more batteries inexpensively and abundantly with better charging and usage efficiencies. Their collaboration will undoubtedly create better lithium-ion batteries, which in turn will trickle down to other devices.
  • Then look at the Israeli startup (StoreDot) working on mass producing their organic battery charging product so users are able to charge their smartphones to 100% in 30 seconds [8] AND be able get it at a ridiculously low price (~$30). The product uses what StoreDot calls nanodot crystals, which moves electrical currents faster than lithium batteries can do. Imagine being in an emergency situation and being able to recharge your smartphone or other devices in 30 seconds – ESPECIALLY when time is a critical element in any emergency!! (Note: As always, there will be competitors who will come up with new technique to charge mobile devices {maybe without a separate charging device} and to last longer
  • Near Field Communication is going to keep on keeping on, why should we need to continue using wires/cables to charge devices or transfer information when NFC is a better alternative (especially for those who lose or damage their USB cables constantly)


As educational software becomes better (3D and immersive interactivity), K – 12 and beyond will keep on seeing growth and more uses for mobile communication and technology. This growth will make it easier for students to continue being part of the classroom when they are sick or hospitalized or have special need situations.

Imagine students being able to have computer displays pop up on the walls because of newer screen display technology – flat, thin and/or able to curve the displays stemming from newer materials and manufacturing techniques.

Imagine these students using better wireless capabilities to connect to the school’s servers, the cloud and other classrooms around the country, the world seamlessly (and cost effectively).

The only problem here is funding to get mobile tech to more students around the country (U.S.). We have stops and starts in funding requirements for all school districts due to the need for necessary tech (hardware and software) upgrades every 2 – 3 years.

Health Care

Remote doctor assistance via in-hospital or clinic robots with a display (likely to be a mobile device mounted on the robot) for the doctor or nurses’ face can allow more patients to be seen in more and varied locations. This is going to increase as the efficiencies (movement, portability, interaction) of robots improve and the prices continue to drop.

With newer mobile communication and technology, nurses at all levels, throughout the hospital or clinic will be able to be constantly better informed of the state of all patients and to better see the needs and necessities required for each of those patients. This will be because the patients will have wearable tech on their person, which will monitor their conditions whenever and wherever they may wander off to within a hospital. The wearable tech will provide patient location and immediate health conditions without being specifically tethered to a hospital bed.

This will also mean the hospital has to adequately plan for a larger use of wireless communication throughout the hospital, which in turn means no wireless blind spots, no latency and no congestion for this wireless communication to have successful efficacies.


To be honest, there are so many conclusions one can draw up and include here. But overall, the mobile communication and device technology movement is going to become beneficial for everyone, in all walks of life.

The battery for mobile devices (and hybrid vehicles) will continue to see powerful efforts due to the less than infinite supply of lithium minerals and where that supply is primarily located (primarily in China). Good news is that the mineral can be recycled but we still need to look at a better substitute for this material, one that can be synthetically produced. We might even see some kind of revolutionary movement in mobile device technology.

Growth in screen display technologies is continuing to improve. OLED seems to be on the uptick in displaying a better and more responsive picture. OLED displays can be flexible (curved or rolled up for storage). While with mobile devices, we might even get to near unbreakable screen displays (think Gorilla glass by Corning on steroids) instead of just ‘break resistance.’

There used to be great talk of having portable devices, which instead of having a physical keyboard, we would be able to use a virtual (infrared laser) keyboard. This virtual keyboard is projected on a surface in front of where the device is located. This virtual keyboard is displayed using light (IR laser) images (somewhat like a holographic image) representing all the keys of the keyboard. The user would just type as they would normally on a real keyboard while the computer would calculate the location of where the fingers are moving for input. This ‘might’ come back and catch on making mobile devices (tablets) even more portable and not having to deal with attachable flimsy keyboards… This is likely to be a boon for all mobile devices instead of trying to type on small screens, allowing us all to see more data on the screen.

And as always, mobile device security will continue to be a primary objective (or should be), ranking up there with mobile device performance.

Lastly, I missed quite a few things in this writing, such as Bluetooth and wireless headphones and ear pieces, wireless communication to and from pace makers and internal insulin pumps. There are simply a great number of things to write about in the mobile communication and technology realm.




BPS              Bits per second

Cores            Cores = CPUs – more cores, more processing – this is done by the OS splitting off tasks to different, available cores – your laptop might have 4 – 8 cores…

Note: when folks say 1,000 times something, they really mean 1,024 – they are rounding down…

EB                ExaByte – 1 quintillion bytes (or 1,024 PB)

Flops            Floating Operations per Second

GB               GigaByte – 1 billion bytes (or 1,024 MB)

                           (3 1,080p movies or 40 CDs or 8,500 MP3s or 1,240 raw DSLR pix)

Malware        Malicious software – software that can harm computing systems

MAM            Mobile Application Manager

MDM            Mobile Device Manager

OLED           Organic LEDs

PB                PetaByte – 1 Quadrillion bytes (or 1,024 TB)

                           (20 million 4 drawer filing cabinets filled w/text or 13.3 years of HD-TV video)

PFlop/s         PetaFlops – 1 Quadrillion (or 1,024 TB or 1,024,000 GB)

RFID            Radio Frequency Identifier (to identify an item or transfer id/info data wirelessly)

TB                TeraByte – 1 Trillion bytes (or 1,024 GB)

                           (60 piles of paper stacked as tall as the Eiffel Tower or 20 HD Blu-ray films)

V2I               Vehicle to Infrastructure

V2V              Vehicle to Vehicle


BYTES         We’ve been rapidly moving into the PB, EB & Zettabyte range for some years

KB – a kilo byte

MB – megabyte – a million bytes





ZB – zettabyte – a sextillion bytes or 1,024 EB

etc… to –> YottaBytes (YB) & BrontoBytes (BB) & GeoBytes (GB)



1 – Do quantum computers threaten global encryption systems?, http://www.bbc.com/news/business-27974877, 11 Aug 2014

2 – NSA seeks to build quantum computer that could crack most types of encryption, http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_story.html, 2 Jan 2014

3 – Worlds’ Most Powerful Supercomputers, http://www.top500.org/lists/2014/06/, Jun 2014

4 – With ‘The Machine,’ HP May Have Invented a New Kind of Computer, http://www.businessweek.com/articles/2014-06-11/with-the-machine-hp-may-have-invented-a-new-kind-of-computer, 11 Jun 2014

5 – Gimme a boost: 3 ways to make calls when your cellular signal is terrible, http://www.itworld.com/mobile-wireless/429686/gimme-boost-3-ways-make-calls-when-your-cellular-signal-terrible, 4 Aug 2014

6 – Buffer Overflow Attack Explained with a C Program Example, http://www.thegeekstuff.com/2013/06/buffer-overflow/, 4 Jun 2013

7 – Understanding SQL Injection, http://www.cisco.com/web/about/security/intelligence/sql_injection.html,

8 – Smartphone charger promises to power up batteries in just 30 seconds, http://www.theguardian.com/technology/2014/apr/10/smartphone-charger-batteries-30-seconds, 10 Apr 2014