GDPR Notice
Thursday, March 14, 2019
World War 3 Watch 04: Indian Defense Equipment strategy
Friday, June 30, 2017
Farmer suicides and loan waivers - can we solve it?
Wednesday, October 19, 2016
Can MTNL and BSNL be salvaged?
How to fix MTNL / BSNL?
- Disclose all information - no matter how ugly. Go back and disclose everything. Let us have ARPUs, Segment-wise, detailed costs as much drill-down as possible. From these numbers someone may be able to gather the strengths of the companies.
- Ground Realities - corruption and compromised staff: The sad reality is that the staff of MTNL works for private companies. They take bribes and ensure poor service quality thereby herding the customers in droves in the arms of private telecom service providers. I have also seen MTNL linesmen working for private land line operators in Mumbai. They take home dual incomes.
- Staff Costs are too high: MTNL costs at 76% of revenues and BSNL are at 53% wheresa idea cellular is at 4%. There cannot be any rational justification for this mess. More than MTNL, the government of India should take a decision and remove this staff. It will be difficult for MTNL to bear the burden of this. Let the staff be transferred to some other productive work - which they are incapable of. Just pay them and let them go. At least they won't damage the government elsewhere.
- Asset sweating and location leverage: Both BSNL and MTNL have superb location from where they operate. These locations can work for telecom base stations, interconnection zones and network switches for all firms. Such operational asset sweating can release vital cash for operations.
- Good Telco - Bad Telcos solution: Create a new listed Telecom entity - say National Telecom and sell MTNL and BSNL assets to that entity and order closure of MTNL and BSNL under Companies Act. There is no reason to have two telecom companies in the same business with different geographic coverage.
- Keep transparent pricing plans and decent customer service and customers will flock to PSUs. Those with customer service of private telcos will agree whole-heartedly. With complicated subscription plans and bill discrepancies private telcos are sitting ducks.
- Telecom-Internet-TV Fibre bundles: The current landscape allows for one state-owned voice-focussed player. After 5 years there wont be any such opportunity. However the PSU Telco will have to quickly shift to data and preferably internet and TV offerings together. It will be easier for this entity to operationalise this than other private operators.
If you let me run these two, I can make them profitable in 3 years.
Friday, August 13, 2010
Comments on Microsoft
- Bundled software in India:
- India still sells laptops without the operating system. The proportion has gone down but it still exists where dominant volumes are.
- Ubuntu and Linux overall has not caught on because it is not user friendly. As it gets friendlier, expect Indians to move to Linux versions faster than Microsoft can cope with. All Microsoft needs to do is support XP. A lot of pirated Windows XP is still being used.
- Such a response is currently underway in mobile phones. I believe it makes sense it happens in mobiles first because, device capability is limited, hardware is cheap (from china) and Indians have unique needs (apparently more Indians need dual SIMs than elsewhere - in pagers we preferred the alpha-numeric ones etc.) I can't see why it cannot happen in laptops. (More about it below)
- India Volume play suits Apple more: If you think about volumes as a driver, Apple makes much better sense.
- We are paying $1000 for iPhones and if you see the penetration you will be amazed. If iPhone were to be available at $500 equivalent Apple would not be able to handle the sales volume. The user interface is mind-blowingly simple even my mom and dad got it right away. (They don't speak computer English). It is very intuitive. Through iPhones and iPads Apple can make a huge in-road into Indian market. They have to price it right though.
- Why I discussed about iPads is that most users do not need a laptop or a computer. They simply need a device that can connect them to the net. A phone is a little small for the purpose but a tablet is ideal. Indian government announced a tablet PC for $35 and it is pretty ok with camera and it works on Android. (It is for education institutes)
- User friendliness is still paramount: While I worked on and loved Unix (was a programmer) but I think for regular computer usage, MacOS, Windows make lot more sense. Android is emerging as a significant alternative in tablets but it is nearly as good as windows CE.
- Distributed legal liabilities: Unix and its versions are popular for server side because of customizability. There is other side to the equation. Security is costly and Microsoft cannot release a lower end product without risking security issues. It is an easy legal target if it fails. So it has to put in lot of effort just to ensure base level security. Linux falls through the legal cracks as the legal liabilities are diffused. Just as small revenues amplify so do small legal claims.
- About security: Security issues are dominant concern for Microsoft. It does not have control over where its operating system is being deployed. It does not know if clients are updating the OS or not. With emergence of Software as a service model (SAAS), Microsoft will breathe easy. I expect as SAAS starts getting prominence, MS will start unleashing its programming prowess to more beneficial use.
- Still top institutional service provider: Microsoft juggernaut is large and has tremendous inertia backing it. The IT departments of top Microsoft clients are testing versions to be released in 2011 and 2012. Frankly, even Apple does not have that kind of sales and testing infrastructure on institution side.
- MS as fast follower: For the consumer side, Microsoft is better characterized as a fast follower than a tech leader. It has always copied Apple and will continue to do so. (Panasonic to a Sony). There are two scenarios from here:
- Currently the environment is in flux so we cannot see Microsoft response but response will come and it will eat away a substantial share.
- The model has changed to a long-tail model. Microsoft noticed this with Zune. It came in very late once the product stabilized but that was too late for the market. So it is match step-by-step in phones. Here too it is a bit late but faster than with Zune. Eventually it will figure out.
- It is the Microsoft game: The game Apple is playing was invented by Microsoft:
- Microsoft dis-assembled the IT hardware and software value chain. It broke the integrated approach of IBM. Apple followed IBM model in hardware and OS and used Microsoft approach with additional software. But overall Apple is still more in IBM mode.
- Apple is breaking the mobile phone software value chain but it retain the hardware approach of IBM in phone space. In phone space it HAS to break the software value-chain. It is doing this through App architecture. That is straight into MS territory. Apple will face same issues as MS if it were as important to business community as MS. Thankfully Apple is sticking to consumer electronics side.
- Blackberry is more like thin-client server model we know. A Google-wave like protocol will break this model. My guess is Microsoft will break blackberry.
- The reason MS cannot fight easily because of legacy codes. Phones need light codes but MS codes is HUGE. But in phones and in computers MS has changed its stance to scrapping old format all together. MS will gain from it because there is so much knowledge that it has but cannot use - now all that will be possible.
Sunday, May 06, 2007
Killer App definitely from Microsoft!!
Slipping through the door - The X-box
The visionary “X” in X-box
The day I saw the X-box, I shuddered! It spells “tough times” for makers of DVD players, Music Systems, Desktop home computers, hand held MP3 players! With the X-box, Microsoft has put into your home an entertainment enabled Hub! Each of the accessories, like Music System, MP3 players, home computer, is a node (or spoke)! Whoever successfully captures the Hub will have a say in what becomes of the node. Truly Microsoft! Capture the most essential part of the value chain and then dictate the terms!
The bigger plot!
It has already started putting the nodes in place with Zune! The credits from playing on-line games can be re-deemed for Zune songs. This is an equivalent of earning and spending online! This indicates development of an “entertainment ecosystem” comprising variety of nodes connected through the net. The variety of software (Operating systems for governing these nodes, content for these) can yield further revenues.
The business genius!
Apart from this technological ingenuity, Microsoft brings superior business sense to the table. (Microsoft must have lots of brilliant strategists amongst all those who cracked the round-man-hole kind of interviews effectively!) Let us imagine Microsoft did think about all these ideas and started work on business strategy. What would have made them put these Trojans into an entertainment machine? In my opinion, luck or otherwise, “entertainment” is the best bet for entering homes. It has the right mix of emotional attachment, passion and perception of need to make it a must buy.
In sum
While we are all busy fighting Microsoft on the security issues, they have quietly built up a platform that can bring them into our homes and much closer into our pockets. Soon Microsoft will touch every part of our life in ways that are more evident. IF someone knows how to buy Microsoft stock sitting in India please let me know!
Tuesday, March 27, 2007
The new "Car"ma
We observe a lot of developments in different technologies that could make an impact in this field:
- Micro-processors are ubiquitous!
- Memory is easily available.
- Cellular infrastructure is in place! Also GPS systems are already being installed on vehicles.
- Sensor technologies are well developed. We already have rain sensors, backing sensors, cameras on board, light sensors etc.
- Short range information exchange technologies are available for example, RFID.
- Display technologies are well developed, a case in point is the new Honda Civic!
Connecting the dots…Car as a gizmo!
To connect the dots we can look at the development of military hardware. We can hazard a few guesses.
We will see more customizable displays in dashboard. For example, the new speedometer is Civic could be customised into a tachometer! We can also expect the LCD screens on the rear passengers to read out the dashboard so that passengers can keep a check on the chauffer! It will also mean that the dashboard space can actually replace speedometer and other read-outs with camera images while backing up or parking.
Your car will be much more integrated with the manufacturer. The manufacturer can put-in a SIM card to transmit the operation data from the car back to factory test centre! In fact soon you could get a call from your manufacturer informing you that your radiator temperature is suboptimal and you need to bring in the car for repair / maintenance.
The revolution will actually happen when automobiles are integrated with traffic system. This will give a whole new meaning to traffic management systems. In fact we may even get some public announcements being relayed into the car speakers! There a possibility for vehicle to vehicle interaction as well. This will give the driver alerts on obstacles beyond the vehicle in the front giving precious seconds for response in case of accidents. Evolved safety systems depending on faster response, automatic collision avoidance etc. will make life easier and safer for passengers and pedestrians. We can very well look forward to “no overtaking” warnings and “vehicle closing-in” alerts.
We can expect vehicles to have access card system to grant access to various systems. If your card has information that you are an authorized driver for relevant vehicle type then the vehicle will work else it will not turn the ignition on.
In Sum
These developments are all a matter of time. Yet these gizmos are virus-prone. We noticed in Mumbai floods that cars with lot of electronics actually ended up worse-off than plain simple mechanical ones. Devices like power windows turned cars into death traps. So we need effective failure-proofing of these technologies before they get into our garages! All said we are looking into a fantastic future for gizmo lovers!
Sunday, January 14, 2007
The New iPhone
One set of learning is more about the technological aspect itself. While other, a more generic, is related to how good companies function. In both Apple showed remarkable insight, attention to detail and perseverance to do right things right.
Sunday, November 19, 2006
A Device for revolution
After a lot of development involving IPods and Mp3 players, we now have about 4GB of memory being stacked in a Sony Ericsson phone. The developments mini SD and micro SD cards, packing up to 2 GB in a micro SD, bring more good news.
Human interaction with the devices has improved with touch screens, bigger screens, video conferencing cameras and full-function key boards being available on mobile phones. We also have mini USB to interface them with other devices.
In spite of the famous Sony battery recall, we now have better and longer lasting batteries and devices that use power more efficiently. Put together we have more juice in our hand-held than few years back.
Devices are now ready to access the network in more efficient manner. Nokia phones now come with the capability of accessing 3G network and Wi-Fi networks.
All these developments have in fact set the stage for a string of developments. We should now see set of applications that can revolutionize the use of mobile devices in years to come. These applications will trigger a realization of importance of security identification that will influence further development of applications.
Next let us try and understand what killer applications can make our hand-held devices even more important to us.
Sunday, November 12, 2006
The next Killer App from Microsoft!
Yet, Microsoft has under its hood assembled technologies that, if assembled intelligently, can deliver the next killer app! I have been loosing sleep over the next killer app till it all occurred to me. My confidence in Microsoft emanates from the fact that under all the inertia, Bill and his boys have assembled quite a bit of stuff.
- Devices: Microsoft understands variety of devices from servers, personal computers, Pocket computers, mobile phones, game stations, music players, clocks and what not! Microsoft knows how to make these things work, connect and share data.
- Search: Window’s Live is Microsoft’s biggest bet in web search business. It might not be successful as a business but it is good enough to demonstrate Microsoft’s technical capabilities. Further the tight integration of search with Vista and Microsoft’s inherent strengths at desktop search are well known.
- Security: I realize that I am treading soft ground but I trust Bill’s team to know and understand a lot about security. After all they created too numerous security holes than the entire programming world put together.
Beyond this, Microsoft also understands key skills operationally required for delivering the next revolution. Tons of cash, enviable marketing and sales engine, global reach are key enablers that can multiply Microsoft’s capability.
But the most important thing Microsoft understands…
That has to be “context”! Have you noticed a pop-up that irritates us when we start typing a letter in MS Word? Microsoft knows that you are typing a letter. Microsoft also knows who it is being addressed to and the location, email address of the person. This through a feature called “smart tags”.
Google on the other hand does not understand context. Nor can others.
Put together…
Microsoft can deliver the next revolution. This revolution will be created through a two level approach:
- At one level will be a device connected to world through a spate of technologies including WLAN, 3G.
- At Second level there will be services that will through software, social networking site technologies and other sharing enabled technologies will create unparalleled utility.
In my next posts I will detail more on each of these. Meanwhile, I just hope people at Microsoft, particularly one who is in India currently, take notice and start working on getting us into the next technology revolution!
Sunday, July 30, 2006
A new ID
Is there a need?
How will government benefit?
In sum
Friday, May 05, 2006
Web 2.0 and New Yahoo!
Thursday, April 06, 2006
My new Samsung D600!
Yet, even after careful selection I found some drawbacks and its just the second day of using it! I guess every good thing also has a little scope for improvement!!
Migrating to D600
I found it extremely difficult to migrate my contacts from Sony Ericsson K700 to D600. I did not have the data cable for K700 did not help the matter. However, I used the Send all option from contact menu of K700 and selected via bluetooth. The D600 received the whole transmission yet only showed one contact in the address book. I eventually had to transfer all my contacts one-by-one! (I know using a computer things would have been simpler but the fact is sending entire address book did not work in D600)
Short service "SMS"
In D600, I cannot choose the default storage for SMS messages. It directly comes into SIM. There is also no option to backup the SMS into the memory card. Also try saving the number from whom you receive an SMS into one of the existing contacts. You cant do it!!! ( I usually get SMS from people saying "This is my new number" rather than getting a vcard!) Life is going to be hell!!
Where are the "Text Notes"
Thirdly, there should have been option for text notes (not those included in the calender but simple stand-alone text notes).
"Menu"s in context
The menus do not change according to context. For example, if I am typing an SMS, the left soft key shows "options" where I click to reach send. However, ideally send should have appeared as the soft key option and options should have come at the right soft key. The right soft key shows "back" which deletes the message if you are not careful.
Samsung does not believe in taking the "Short Cut"
You cannot assign all menu options to the shortcuts. The options are restricted and rest of the menu are out of bounds!!
Cannot fly without a "Flight mode"
Lastly, an executive phone that does not have a "airplane mode" or "flight mode" is hard to believe. They should have included it on D600. Of course Mobile-review team has mentioned this in their review but this is something what I call a must have!
In sum...
So there it is the list of some of the drawbacks of what basically is a "potentially" great phone. There are loads of features like TV out and great camera and a lot more. I am hoping they have sorted these things out in the next edition D800 slim slider phone! For more on D600 / D800 and other mobile phones visit www.mobile-review.com!
Wednesday, March 29, 2006
Mobile Devices - The New Business Model
One serious impediment for exploitation of mobile services is the lack of location tracking at close range. At the most a phone can be tracked to the nearest tower. Lets imagine if it were possible to track a phone right down to within 5-10 meters. We all know Bluetooth can enable this very effectively.
First constraint is that people switch off their bluetooth communications. Can one overcome this constraint? Of course, if offers are flashed only on bluetooth then people will switch on their bluetooth.
Second is privacy. People will not welcome spam on their mobile devices. Frankly the messages one gets while roaming are extremely irritating.
Third is security. Why will I enable my bluetooth connections for others to send messages to me? Will it mean I will be exposed to Viruses or any other threats?
To avoid this advertisers need to place constraints on themselves. These could be enforced technologically too. Like for example imagine a program, a bluetooth message trasmitter server and a receiver client, that makes sure the messages are customised and welcome. How?
Imagine the "client program" has options that let me choose the products for which I want offers. The "server program" knows and only sends me those offers that I have asked for!! This "client program" can be freely distributable with mobile phones (just like our dear Adobe Acrobat). The "server program" will be bought by local advertisers (shops, malls, bus service providers etc) and telecom companies will run them. We all know that the "client Program" can be configured to be independant accepting only from "known" "server programs" thus eliminating security threats.
I think this means my mobile experience will be much more valuable, there will be additional revenue for Telecom service providers, and local advertisers will have lower advertising cost enabling highly targetted advertising. Wont it make a better world? What Say?
Thursday, February 09, 2006
A new way to advertise online!
Sunday, May 08, 2005
ICE: The Telecom / Technology story PART II
In the last articles we had examined how some of the issues with Communication revolution are resolved. Now, will it be possible for the communication revolution to hit us as hard as had been predicted? Again I do not have the answers.
Yet, when I observe the ICE space evolving in the Indian context, I see a clear dichotomy of evolution. Service Providers are seeing great business models in the application segment. Hence they are pushing applications to the consumers. Some of the very basic applications have been a hit. “TV on the mobile” has not really taken off but downloading ring tones has been a money spinner. Consumers are accepting some and rejecting many applications. The service providers and instrument manufacturers are eager to understand what the next money spinner could be.
I believe the key to the success of new applications rests with the device. Let us look at the device in more detail.
Device
A device is a piece of equipment we use to access the bandwidth. These devices are tools for processing information, communicating tools or entertainment platforms.
Components of the device
Any component can be disaggregated into:
- Processor
- Memory / Storage
- Human Interface
- Identification
- Power unit
- Network Interface
Processor
A significant development is happening from each of the devices getting a piece of silicon in them. Things from alarm clocks to washing machines to cars to televisions everything has become “smart”.
If you look closely, you will realize that in devices where there was enough space and supply of power people have thought of putting a processor. Nanotechnology is making these chips smaller and faster and cooler (lower heat generation). This is assisting the development.
Applications can be developed for devices that have a general purpose processor with an operating system. The Application based business model will imply that environment will favour these devices. In fact, many of the applications that currently use special purpose processors (Fuel timing chips in cars) will start using this business model. But just wait before you start dreaming about the kind of possibilities.
Memory / Storage
As with the processor chips, memory chips are getting smaller. Sure, but there is a difference. Let me bring your attention to the different business models. They demonstrate the evolution discreetly.
Your Mobile Service voicemail, which is a form of storage of information, resides on the network, but your SMS messages need to be stored on your device. Have you thought why?
Well the simple answer is that Voicemail was bulkier than SMS and memory in the device was scarce so smaller size application moved to the device first. So does this mean that eventually when we have “a lot” of memory all the data will sit on our mobile phones? I guess not.
The key question one needs to ask is what happens when the bandwidth access speed becomes so fast that we can access most of the application on the fly. To answer this, look at the email. Email for most cases is stored on central servers.
What I am stating is that there are various models, the email model wherein data stays on the server, applications stay on the mobile. There is SMS model, where in the data stays with the person and the application goes to the server.
Where what is stored is decided by the bandwidth available at your disposal. Consequently, as the bandwidth increases, we might shift towards fetch as you need models.
Moving further…
The components that I am discussing below are a little far fetched. I am not sure if they will happen as there are some economic / strategic / competitive reasons for suggestions not happening. If you know any reason what are the reasons these would not happen please write to me.
I will however, continue with the series of components of the devices. The next being the human interface.
Human Interface
Human Interface is something wherein we are able to interact with the device. This is also an area where least development has taken place. The reason is just that collectively we take a lot of time to learn the new ways to interface with machines. In one sense “driving a car” is an interfacing function and so is interacting with a computer.
But beyond the weirdness, if you simply concentrate on computer – human interface, you will find discrepancies. For example, computer screen is now our primary media, yet we type documents in A4 format. Does that make the documents more readable?
Mobile phone manufacturers are telling us that we should watch television on the mobile phone screen. No one asked me am I comfortable watching it.
There are some developments worth noticing. People have put television screens in cars, behind aircraft seats and possibly wherever they could. Also the projection technology is improving substantially.
What can drastically alter the interface aspect is the internetworking of all these interface technologies. Like your laptop keyboard can be used for your mobile. And your television can show the photo you just received on your computer. We get the hint with the new software that comes with the cell phones these days that allow you to peek at the Cell phone contents thorough your computer.
So it means that we will use what ever screen we have in close proximity to us. The software that will allow for this versatility will have to hit the market. But there is a strong case for such internetworking to happen.
Sounds weird doesn’t it? But there is no reason it should not happen. And though it has already started sounding magical there is more.
Identifiers
Identifiers are those parts of devices that enable the network to know your identity. The SIM card in the mobile phone is one such identifier. On the computer there is a login-password mechanism that is used as an identifier.
As is well known the identifiers are key to security! (PUN intended) In fact a lack of developments in convenient scanners has limited the growth of the online transactions. It is primarily why Bill Gates is tracking security closely. That is why he is such a visionary.
There are two / three elements in the security environment. One is scanning the user input and second is transporting it across the bandwidth securely.
Public Key Infrastructure promises to deliver this very functionality. Coupled with a hand held reliable finger-print scanner, this will transform the way we conduct business. I think we need to watch for a day when hand held scanners can be connected with or embedded in a cell phone.
There will be a substantial discontinuity in terms of electronic transactions when that happens.
Yeas of course there is still more.
Power
Every device needs power. Mobile devices carry their power pack along with them, rest of them are plugged to the wall because of power.
Improvements in battery technology have allowed us to have longer battery life out of a smaller battery. It has allowed us to have lot of applications running on our mobile devices.
Battery has played a critical role in the number of applications the mobile device can take. The better the battery the more applications you can load on it.
Charging technology has also improved. Apple has made some progress in this area by making the iPod charge while we play the songs from it.
Yet, have you noticed that the device manufacturers do not have a standard battery packs. Each device comes with its own charger and its own socket. We cannot use a Nokia charger with Samsung Phone, or we cannot use a cell phone charger for a laptop. If these devices have interchangeable power plugs, it will mean a lot more convenience for the consumer.
When we will see a movement in that direction is God’s guess.
Summary
We have seen how the different components of the devices can change and unleash a new wave of applications. At the outset some of the thoughts may seen outrageous, but it is not that far fetched.
For example, the power units of computers are standardized across motherboards so it is not unrealistic to expect that we can have a standard for power plugs in mobile phones. These are changes that have happened and will happen sooner or later.
The way forward
In the next article I will examine what are the different kinds of functionalities that can be added into mobile phones as an example. I will propose a hypothesis that there is a convergence in devices as well in terms of components. I will also give you examples where components are added to the device to create better value and also examples where components are sold separately to create value.
Feedback
Please let me know what you think on this. Your feedback is critical and will enlighten me. And do check back again to read about the new devices and the future of ICE.
Sunday, April 17, 2005
ICE: The Telecom / Technology story!
Communication and Technology revolution has flummoxed many in the so-called "real" world. On one side, more people are comfortable in downloading ring-tones and watching movie trailers. On the other, there are others who are still wondering about what happened to the future when the refrigerator would talk to the online grocer and order groceries. In the business world the top management is scared that their ERP solution will become obsolete even as they roll it out. But will it actually happen is a question to which there is yet no answer.
I am as confused as everyone else. Yet, in the following these are a series of articles detailing some aspects of these issues that may provide an answer. I have read some literature on these issues from various sources and Telecosm by Gilder is something that I would like to recommend. Yet the views expressed in the following articles are my own and may be wrong. I invite you to please provide me valuable feedback and opinions on these.
The Issues with Communications Revolution
We all expected that communication revolution that started with the Internet to invade every aspect of our professional and personal life would hit us soon. We all waited but it hasn’t come yet. There are reasons that are apparent in the hindsight. Some of the prominent ones were:
1) Lack of Cheap bandwidth
2) Lack of last-mile access Infrastructure
3) Lack of Ideas.
Bandwidth Problem
The applications thought possible, during the peak of the 2001 tech bubble were conventional applications. Like “movies-on-demand”, a lot of these applications required bandwidth that is simply not available. Some applications like Internet based real-time ERP faltered because bandwidth across international borders was absent. This connectivity was essential as the businesses became more and more globalized.
But as of now, a lot of band has come up. There is a lot of fiber very close to where you are sitting and reading this article now. A significant gain has also been because of the price discovery of the fiber bandwidth by the service providers. Service providers now see fiber-optic cables as information pipes and are focusing on capacity utilization. This seems to be common sense wisdom and they were focusing on these earlier. But there is a key difference. I will highlight it as we come to it.
Last Mile Access Infrastructure
Last mile access was unavailable. By this I do not mean that we had no solution to last mile connectivity, but that it was expensive.
Often the accessing equipment could be used for little else. The desire was never urged on by a need. This is exactly what mobile-phone revolution has done. The coming of age of 3-G mobiles has given the mobile users different ways and means to be connected. The revolution has changed the lifestyle of people making them comfortable carrying a device with them 24X7.
Only two other devices in human history have created such a powerful change, first being wristwatches and second being the Walkman. Yet the key aspect of the mobile revolution is that now people carry with them in the form of a mobile phone, a processor, memory and a modem. And they carry it 24X7.
This has subsidized (mentally) the cost of getting the last-mile-access device with you.
Lack of Ideas
The foremost problem was the lack of ideas. Of course business has a way of weeding out the bad ideas sooner or later. But there are a lot of things that are starkly visible. Like for example, what Gilder says in Telecosm, we have voice networks (Telephones) carrying data (Fax) and we also have data networks (Internet) carrying voice (Internet Telephony).
Similarly we have different business models running on same “bandwidth”. Like we pay per minute for calls on mobile phones, but FM radio on the same device is free. Some of the data (voicemail) is stored on remote server, some on device (SMS, voicemail). Some data (PIM data) that ideally should be on a remote server is replicated on different devices; where as some data that should ideally be on the device we need to download (MP3, Songs).
Problems are solved…
But all these problems are getting sorted out. And a new reality we all were anticipating is emerging. But it is not something that we envisaged. The new reality is mix of partly things that we anticipated and partly of something totally different. So what is the new reality?
In the next article we will examine the future gadgets that can exploit these developments. We will also examine which gadgets can succeed and what infrastructure can profitably come up to serve the new information applications that will thrive in the new world.
Friday, October 22, 2004
Smart Cards
- Debit card for Bank A
- Debit card for Bank B
- Pertol consumer card from co P.
- Petrol user card from Co. Q.
- Cellphone gift card.
- My Book club card.
And yet I dont have a credit card. Regularly I receive a lot of offers from my cellco and other co.s which offer me great discounts if I show that card at a certain restaurant. When I decide to go to a restaurant I forget if I have a discount offer for that restaurant and if that was from my book club or it was from my petrol pump company or my supermart. Welcome to the card heaven!! This is the 21st century.
Introducing a high security Java card. This one will do a hell lot of things for you and it will be the only card you will carry. Look at this:
BENEFITS:
- Works with ATMs of all banks.
- Works with credit/debit card companies. (How does the customer select whether he wants to pay by debit card or credit card?)
- Works with fill-up card / loyalty card machines etc.
- Works as an Id. has your foto on it. Stores various important numbers like passport number driving licence number.
- Has your thumb digital imprint on it for verification. May be Iris scan too!
- Has a unique number that can be used by cellcos and other cos to enable their offers on your card.
- Functions as a Voters ID.
- Can enable access to your computer over the network which is the basic concept of the SUN JAVA card.
- Can be used as the Cell-SIM for CDMA/GSM and other phones.
- You have to plug into your Movie theater to open the seat which naturally disables the cell connection.
- Is put into a special close-fit charged cover in hospitals which can be read by the magnetic/door access systems.
Is it utopia? Are we in heaven? Is it possible? What could be the problems with such a system? Well welcome to digital reality!!
MECHANISM BASICS: (These need to be revamped of course)
In this new system, unlike the old, the card is more powerful than the machine that accesses the card information. So our machine is dumb or semi-smart. Which means that it can access only a certain information form our card. This it does in presence of two thumb imprints. One of the operator designated and other of the holder of the card. Without the thumb scanner of the card holder the card will not divulge any details.
- How to maintain the integrity of the machines? The machine may be tampered with to access different data from the card and thus compromising the security of the card holder.
- How will the card be disabled when it is lost/stolen etc.? One solution: Use an access machine with card number and the users thumb imprint which will automatically disable the card. A wrong usage increases sequrity requirement by say asking for finger prints of two fingers and three wrong attempts wipes the data off the card making the card useless.
Physically, the card would be made up of four components:
- the main card.
- the SIM attachment
- the semi-SIM (SMS only)
- close fit cover battery
Main Card
Main card would consist of a memory device that can store a large quantum of data. Primary required data can be classified as:
- Identification data: Voter ID, Passport No. Driving Licence No., finger prints, iris scans, signature copy, digital photograph, distinctive characteristics etc.
- Service Information: like bank details for credit and debit card, club id card and premissions granted by these service providers to the card holder.
- Access information: Details like which computer the data of the person is stored etc.# Details: Driving Licence details, Passport details, Voter details, Address phone number email etc.
- Transitory data: This data may be added or deleted by the user by using a computer / card access machine. If the card is lost and new card is made then the transitory data would be lost.(why? Maybe unless the card is backed up)
-
The edges would be magnetised as required by the credit card/debit card swipe mechanisms.
Most of the places this card without the SIM / Semi-SIM / Cover will be used.
The top of the card will carry the photo and some details of the card-holder as a requirement of ID card.
The top will also have printed the Voter ID number or one CArd identification number. Which will be public in nature.
Will consist of a processor
Will have "wired-in" / "burnt-in" instructions to check the validity of the machine accessing the information. The processor will use the power from the host machine. Will reject any transaction if the host machine fails the ID test. If the host machine passes the processor will monitor and log the data accessed while granting permissions to the host machine for every access.
Processor will compute the best deals for the card holder when used in transactions like credit card debit card / money spent.
Processor will maintain a clock thats in-sync with the central world clock.
SIM attachment
SIM attachment will be housed in the card but it can be removed manually creating a small notch in the shape of the SIM.
The SIM attached to the card, and the cover battery put on will make a homing device since the SIM signal can be tracked by the Cell Ground Stations.
In areas where cell phones are not allowed the card will function only when the SIM is attached to the card.
ex. The movie theater seats will open for seating only when the card is inserted into the chair access slot and kept there. The chair access slot will check for SIM presence without which the seat remains closed.
ex2. In petrol pumps, cars where cell phones are not allowed machines will check for the presence of the SIM on the cards.
Semi-SIM attachment
This allows the user to send and receive SMS on his cell phone. Also works as a pseudo-SIM for Blue-tooth / WAP / access. This however puts the cell-instrument on the silent mode. Looks attaches exactly like the standard SIM.
This may be used for incoming calls with a message to the caller indicating the status of the called party.
Close-Fit Cover Battery
This covers the card totally and plugs-in to the card at certain points. These points serve to fix the card tothe cover.
This attachment together becomes a play / game device. We have games on parallel with the get-a-date game famous in Japan. So it may have two/three LEDs for adding fun to the experience.
This cover has a data port connection for connecting to a computer / card access machine. With the connection in place the crd-holder can input transitory data to the card. Game data is transitory data.
The card cover is dumb and can be interchanged. Any cover can be used with any card. So on purchase the card may come with two or three covers depending upon the requirement of the user.
Card cover can be charged just like a cell phone using the same technology.
CONCLUSION: Will it become a reality?
Companies are working on a multi purpose cards. But one never knows if thats going to take off. But at least they are thinking and that is a good sign. The key hurdle I believe is to make this card take off, even if some one can make such a card. Technology is not a hurdle here, acceptability is. If someone can solve that problem the entire concept can work like a dream.
More than that our purses will not be jammed with cards from different companies. The money part however will still remain!! ;)