Cuáles son los idiomas que están en peligro de extinción por culpa de los smartphones – El Mostrador

El universo online, con sus más de mil páginas web, está creando toda una revolución idiomática potenciada por el uso de nuevas tecnologías en nuestra vida diaria, como el GPS o el uso de comandos de voz en el celular.Ha llegado incluso a imponer un nuevo lenguaje plagado de tecnicismos informáticos y anglicismos.Y el desarrollo de nuevos dispositivos y tecnologías que no reconocen todos los idiomas agudiza el problema.

Fuente: Cuáles son los idiomas que están en peligro de extinción por culpa de los smartphones – El Mostrador


Por un populismo digital / Blog AGETIC

no es falso considerar hoy en día que todos estos datos que proveemos a los gigantes de la economía digital en cada uno de nuestros actos digitales (simplemente, por ejemplo, desplazándonos con un teléfono geolocalizado), y que nos revenden luego bajo la forma de servicios diversos, constituye una de las expoliaciones del bien del pueblo más espectacular de la Historia.

Fuente: Por un populismo digital / Blog AGETIC


Forget the internet of things – we need an internet of people | Technology | The Guardian

From cars to umbrellas, everyday objects are becoming increasingly connected. But the question we need to ask is – should they be?

Fuente: Forget the internet of things – we need an internet of people | Technology | The Guardian


Commander-In-Chief Donald Trump Will Have Terrifying Powers. Thanks, Obama.

He’ll control an unaccountable drone program, and the prison at Guantanamo Bay. His FBI, including a network of 15,000 paid informants, already has a record of spying on mosques and activists, and his NSA’s surveillance empire is ubiquitous and governed by arcane rules, most of which remain secret. He will inherit bombing campaigns in seven Muslim countries, the de facto ability to declare war unilaterally, and a massive nuclear arsenal — much of which is on hair-trigger alert.

Fuente: Commander-In-Chief Donald Trump Will Have Terrifying Powers. Thanks, Obama.


Internet or Splinternet? by Joseph S. Nye – Project Syndicate

The Internet is a network of networks. Each of the separate networks belongs to different companies and organizations, and they rely on physical servers in different countries with varying laws and regulations. But without some common rules and norms, these networks cannot be linked effectively. Fragmentation – meaning the end of the Internet – is a real threat.

Fuente: Internet or Splinternet? by Joseph S. Nye – Project Syndicate


Las caras de la tecnología o la narcoeconomía – El Mostrador

Existe la dependencia que tiene toda la industria digital del mineral llamado coltán, que se produce mayoritariamente en la República del Congo. … Sí, ese es un de los temas que toca este artículo. Pero la verdad es que se pasea por casi todos … ; y también aborda lo que hoy está sucediendo en Chile … Es mucho … pero igual [AP]

Fuente: Las caras de la tecnología o la narcoeconomía – El Mostrador


Silicon Valley was going to disrupt capitalism. Now it’s enhancing it | Opinion | The Guardian

The tech giants thought they would beat old businesses but the health and finance industries are using data troves to become more, not less, resilient

Fuente: Silicon Valley was going to disrupt capitalism. Now it’s enhancing it | Opinion | The Guardian


Blockchain: the answer to life, the universe and everything? | World news | The Guardian

Have you heard the good news? The blockchain is here – and it’s going to save everything.If you aren’t tied to the tech community, you might not have picked up on this salvation rhetoric. But you probably have heard of bitcoin, which burst into the public consciousness before imploding dramatically in 2014.

Fuente: Blockchain: the answer to life, the universe and everything? | World news | The Guardian


E n e l Enjambre . P ara una crítica d e la opinión pública pos moderna Han, Byun – Chul (2014).

Byung-Chul Han realiza una aguda crítica a la ideología que transportan los procesos de globalización y analiza como esta ideología, neoliberal, captura el discurso del proceso civilizatorio y lo convierte en un poderoso instrumento de control social. Estacaptura, dice, no conduce a una sociedad del bienestar sino a una sociedad del malestar: enferma, enajenada y neurótica, hundida en el paroxismo del rendimiento/éxito, anegada en sus portentosas tecnologías, donde los maravillosos avances de la ciencia y la tecnología sucumben ante las economías de mercado que no logran implantar estados prósperos y felices.

Fuente: 01_Serrano_R90.pdf


Europe’s leap into the quantum computing arms race — FT.com

It is a dizzying gamble and there are billions of euros riding on the outcome. If the wager pays off, Europe will hold its own against mighty China and the US; if not, the entire project will be regarded in hindsight as a breathtakingly indulgent folly. I refer, of course, not to the forthcoming referendum on Britain’s EU membership but to the European Commission’s announcement last week that it would be launching a €1bn plan to explore “quantum technologies”. It is the third of the commission’s Future and Emerging Technologies Flagship projects — visionary megaprojects lasting a decade or more. These are challenges too grand — and bets too risky — for a single nation to square up to on its own.

Fuente: Europe’s leap into the quantum computing arms race — FT.com


The hype over metadata is a dangerous myth – FT.com

Communications data — and the government’s powers to collect them — are at the heart of the draft Investigatory Powers Bill introduced by Theresa May, UK home secretary, which is currently under scrutiny. Such metadata are the digital exhaust of our

Fuente: The hype over metadata is a dangerous myth – FT.com


Digital advances uneven across US economy – FT.com

Large sections of the US economy are failing to make the most of digital technologies and millions more jobs are set to be displaced as companies do more to harness the innovations available to them, according to a new report. Research from the

Fuente: Digital advances uneven across US economy – FT.com


How Big Business Is Helping Expand NSA Surveillance, Snowden Be Damned – The Intercept

How Big Business Is Helping Expand NSA Surveillance, Snowden Be Damned – The Intercept.

Featured photo - How Big Business Is Helping Expand NSA Surveillance, Snowden Be Damned

Since November 11, 2011, with the introduction of the Cyber Intelligence Sharing and Protection Act, American spy agencies have been pushing laws to encourage corporations to share more customer information. They repeatedly failed, thanks in part to NSA contractor Edward Snowden’s revelations of mass government surveillance. Then came Republican victories in last year’s midterm Congressional elections and a major push by corporate interests in favor of the legislation.

Today, the bill is back, largely unchanged, and if congressional insiders and the bill’s sponsors are to believed, the legislation could end up on President Obama’s desk as soon as this month. In another boon to the legislation, Obama is expected to reverse his past opposition and sign it, albeit in an amended and renamed form (CISPA is now CISA, the “Cybersecurity Information Sharing Act”). The reversal comes in the wake of high-profile hacks on JPMorgan Chase and Sony Pictures Entertainment. The bill has also benefitted greatly from lobbying by big business, which sees it as a way to cut costs and to shift some anti-hacking defenses onto the government.

For all its appeal to corporations, CISA represents a major new privacy threat to individual citizens. It lays the groundwork for corporations to feed massive amounts of communications to private consortiums and the federal government, a scale of cooperation even greater than that revealed by Snowden. The law also breaks new ground in suppressing pushback against privacy invasions; in exchange for channeling data to the government, businesses are granted broad legal immunity from privacy lawsuits — potentially leaving consumers without protection if companies break privacy promises that would otherwise keep information out of the hands of authorities.

Ostensibly, CISA is supposed to help businesses guard against cyberattacks by sharing information on threats with one another and with the government. Attempts must be made to filter personal information out of the pool of data that is shared. But the legislation — at least as marked up by the Senate Intelligence Committee — provides an expansive definition of what can be construed as a cybersecurity threat, including any information for responding to or mitigating “an imminent threat of death, serious bodily harm, or serious economic harm,” or information that is potentially related to threats relating to weapons of mass destruction, threats to minors, identity theft, espionage, protection of trade secrets, and other possible offenses. Asked at a hearing in February how quickly such information could be shared with the FBI, CIA, or NSA, Deputy Undersecretary for Cybersecurity Phyllis Schneck replied, “fractions of a second.”

Questions persist on how to more narrowly define a cybersecurity threat, what type of personal data is shared, and which government agencies would retain and store this data. Sen. Ron Wyden, D-Ore., who cast the lone dissenting vote against CISA on the Senate Intelligence Committee, declared the legislation “a surveillance bill by another name.” Privacy advocates agree. “The lack of use limitations creates yet another loophole for law enforcement to conduct backdoor searches on Americans,” argues aletter sent by a coalition of privacy organizations, including Free Press Action Fund and New America’s Open Technology Institute. Critics also argue that CISA would not have prevented the recent spate of high-profile hacking incidents. As the Electronic Frontier Foundation’s Mark Jaycox noted in a blog post, the JPMorgan hack occurred because of an “un-updated server” and prevailing evidence about the Sony breach is “increasingly pointing to an inside job.”

But the intelligence community and corporate America have this year unified behind the bill. For a look into the breadth of the corporate advocacy campaign to pass CISA, see this letter cosigned by many of the most powerful corporate interests in America and sent to legislators earlier this year. Or another letter, reported in the Wall Street Journal, signed by “general counsels of more than 30 different firms, including 3M and Lockheed Martin Corp.”


Satellite-based Internet is the next frontier in net neutrality.

Satellite-based Internet is the next frontier in net neutrality..

The space Internet.

 Earth from the International Space Station
While a pandemonium of overlapping and redundant wires power our terrestrial Internet, a heavenly Internet is taking shape over our heads. Above, the Earth seen from the International Space Station, on June 2012.

Photo by Don Pettit/NASA

In the past few months we’ve heard a lot about two opposite Internets, one infernal and one heavenly.

The infernal Internet emerges from the recent debate over net neutrality. Naturally, this Internet lives underground, a pandemonium of overlapping and redundant wires accumulated over the past half-century. In the undersea cables and repurposed telegraph vaults of this Internet, greed rules. A cutthroat competition for nanoseconds of advantage has companies grappling ceaselessly for real estate. The titans of this Internet rent space in orgiastic facilities where they jack into one another via unholy “peering arrangements,” bypassing the common Internet and edging out possible newcomers. Federal Communications Commission Chairman Tom Wheeler had to descend into this inferno this February like the Archangel Michael, routing the cable industry’s monopolistic control over “last-mile” consumer broadband in this country.

Meanwhile, a heavenly Internet is taking shape above our heads. In the same week this January, the spaceflight companies SpaceX and Virgin Galactic both announced plans for “megaconstellations” of low-Earth orbit, or LEO, satellites delivering broadband to every inch of the inhabited world. (Disclosure: I spent some time last year working for SpaceX on unrelated projects.) Instead of greed, this Internet is said to be propelled by philanthropic purpose. The satellite schemes join the host of projects aiming to bring connectivity to areas cable can’t reach. Instead of devils, this Internet has saints: Richard Branson promising to “transform the world,” Elon Musk battling the defense-aerospace-industrial complex, Eric Schmidt of Google taking a chance on routers strapped to helium balloons, and Mark Zuckerberg executing surgical strikes on global poverty with Wi-Fi–equipped drones. There’s profit to be made among the roughly two-thirds of humanity that remain unwired, of course, but its pursuit seems beatified by the messianic pursuit of one digital family of man.


Google to put health information directly into search results | Technology | The Guardian

Google to put health information directly into search results | Technology | The Guardian.

Google health

 Google says one in 20 searches is health-related. Photograph: Cultura Creative (RF)/Alamy

Google is changing the way it displays search queries to pull medical facts directly into its results.

The medical information is being added to the company’s Knowledge Graph, which underpins Google’s instant search results and powers Google’s Now personal assistant and app. It will allow health questions to be answered directly, without a user having to click.

Google already does this with dictionary definitions, schedules for big sporting events and Wikipedia extracts for famous people. Knowledge Graph is essentially a built-in encyclopaedia, which pulls in facts, data and illustrations from various sources.

One in 20 searches on Google are health-related, according to the company. “We’ll show you typical symptoms and treatments, as well as details on how common the condition is – whether it’s critical, if it’s contagious, what ages it affects, and more,” said Prem Ramaswami, a product manager for Google’s search.


Encriptación punto-a-punto: de la oscuridad al mainstream | Manzana Mecánica

Encriptación punto-a-punto: de la oscuridad al mainstream | Manzana Mecánica.

Lunes 5 Ene 2015

Carlos Castillo

En pocos días he llegado a un punto de saturación respecto a leer predicciones para el 2015. Muchas de las predicciones son, fundamentalmente, cosas que ya están sucediendo y que al autor de la predicción le gustaría que continuaran sucediendo. Eso no tiene nada de malo, pero no estaría mal llamar a las cosas por su nombre.

En ese espíritu, creo que hay algo muy importante que sucedió a fines del 2014 y que estaría muy bien que continuara sucediendo el 2015. Me refiero a la transición que están experimentando las tecnologías de nube con conocimiento cero, en particular la encriptación punto-a-punto.

Conocimiento cero = bueno

Almacenar cosas en la “nube” es valioso por varios motivos. Primero, poder acceder a tus propios archivos desde cualquier dispositivo (móvil, tabletlaptop, etc.) es muy conveniente. Segundo, un efecto secundario positivo es que tienes un respaldo de estos archivos. Tercero, es más fácil compartir un archivo con otra persona si tu archivo ya está en la “nube”.

Para muchas personas, resulta obvio que si, por ejemplo, subes algunas fotos a un sistema de almacenamiento, entonces tus fotos quedan a disposición de la gente que opera esa nube. La gente que trabaja para esa empresa puede ver tus fotos, y si los hackean a ellos, o si adivinan tu clave sin necesidad de tener acceso a tu dispositivo, entonces tus fotos pueden acabar en cientos de sitios en Internet.

Para un cliente corporativo, el problema de almacenar secretos de negocio en la nube es mucho más serio, sobre todo si se trata de un negocio del sector tecnológico (posible competidor del proveedor de nube) o que compite con alguna empresa estadounidense, como le sucedió a Petrobras.

Un proveedor de almacenamiento remoto no necesita tener acceso al contenido de tus archivos para poder almacenarlos.

Resulta obvio para casi todo el mundo que esta desventaja es una consecuencia inevitable de subir un archivo a Internet, pero no tiene por qué ser así. Desde hace décadas que existe tecnología para encriptar un archivo antes de subirlo, y decriptarlo después de bajarlo. En otras palabras, para que, sin necesidad de que tú tengas que hace nada ni siquiera preocuparte de lo que está sucediendo, un sistema de almacenamiento pueda funcionar con conocimiento cero.

En algunos casos, el proveedor de almacenamiento ofrece esta característica como una de sus cualidades principales, como es el caso de SpiderOak. En otros casos (e.g. Dropbox), es el mismo usuario el que debe configurar su computador para que utilice cero-conocimiento, como explicamos en un artículo anterior.


Internet: El saber ya no cabe en el campus | España | EL PAÍS

Internet: El saber ya no cabe en el campus | España | EL PAÍS.

 

En la era de Internet la Universidad ha perdido el monopolio del conocimiento. Los estudiantes y el mercado exigen un modelo más flexible

 

 

eduardo estrada

Aprendió a programar buscando información en Internet y con algo de ayuda de su padre, también programador. “Lo hice con tutoriales; ensayo y error y echándole muchas horas”. En clase, se aburría. A los 12 años, Luis Iván Cuende creó un sistema operativo de software libre, a los 15 ganó un premio al mejor hacker europeo menor de edad. Con 19, monta empresas tecnológicas, ha publicado un libro —Tengo 18 años y ni estudio ni trabajo—, da conferencias por todo el mundo y ha sido asesor especial de la vicepresidenta de la Comisión Europea. Y no piensa estudiar una carrera. “Simplemente, creo que no aporta nada a mi método de aprendizaje, porque aunque no esté en la universidad yo aprendo todos los días”, explica.

Siempre ha habido mentes más despiertas, que sobresalen por cualquier razón, y siempre ha habido autodidactas. Pero en el mundo de Internet, el joven Cuende representa algo más. Es la personificación de los augurios de algunos expertos que aseguran que la democratización del conocimiento a través de la Red terminará haciendo de las carreras universitarias algo innecesario.

Otros, la mayoría, no van tan lejos: “El valor de la Universidad no es solo transmitir conocimientos, se trata de formar a personas, su identidad, su capacidad crítica y analítica”, dice Roger Chao, profesor de la Universidad de Hong Kong y asesor de la ONU. Pero casi todos admiten que la educación superior está ante un cambio radical y que los campus han de adaptarse a las necesidades de los alumnos y no al revés, como ocurría hasta ahora.


¿Video killed the radio star? sobre lectura, libros y cultura digital | Manzana Mecánica

¿Video killed the radio star? sobre lectura, libros y cultura digital | Manzana Mecánica.

Miércoles 17 Dic 2014

Carolina Gainza

La semana pasada participé en una mesa en el II Seminario Internacional ¿Qué leer? ¿Cómo leer?. El objetivo del panel era reflexionar, en el marco de las prácticas de lectura y las formas de procesar la información en nuestra época, sobre la pregunta que lanzó Nicholas G. Carr en su artículo publicado el 2008 en The Atlantic¿Está Google volviéndonos estúpidos?.

Desde mi experiencia, la respuesta a esta pregunta fue un rotundo no. Después de haber leído bastante sobre literatura digital y ver cómo en su momento, e incluso aún se escucha, se planteó la muerte del autor destronado por el lector, la muerte del libro, la decadencia de la cultura, y ver cómo este tipo de preguntas responden a un miedo a lo nuevo y lo desconocido, mi respuesta no podía ser diferente. De alguna manera, varios paneles en el seminario apuntaron a un cambio en las formas de conocer y procesar la información en nuestra época, lo cual afecta directamente las prácticas de lectura.


The best of capitalism is over for rich countries – and for the poor ones it will be over by 2060 | Paul Mason | Comment is free | The Guardian

The best of capitalism is over for rich countries – and for the poor ones it will be over by 2060 | Paul Mason | Comment is free | The Guardian.

Populations with access to technology and a sense of their human rights will not accept inequality

 

 

Spanish policemen watch would-be immigra

Migrants scaling a fence at the Spanish city of Melilla in March this year. Photograph: Jose Colon/AFP/Getty Images

 

One of the upsides of having a global elite is that at least they know what’s going on. We, the deluded masses, may have to wait for decades to find out who the paedophiles in high places are; and which banks are criminal, or bust. But the elite are supposed to know in real time – and on that basis to make accurate predictions.

Just how difficult this has become was shown last week when the OECD released its predictions for the world economy until 2060. These are that growth will slow to around two-thirds its current rate; that inequality will increase massively; and that there is a big risk that climate change will make things worse. Despite all this, says the OECD, the world will be four times richer, more productive, more globalised and more highly educated. If you are struggling to rationalise the two halves of that prediction then don’t worry – so are some of the best-qualified economists on earth.

World growth will slow to 2.7%, says the Paris-based thinktank, because the catch-up effects boosting growth in the developing world – population growth, education, urbanisation – will peter out. Even before that happens, near-stagnation in advanced economies means a long-term global average over the next 50 years of just 3% growth, which is low. The growth of high-skilled jobs and the automation of medium-skilled jobs means, on the central projection, that inequality will rise by 30%. By 2060 countries such as Sweden will have levels of inequality currently seen in the USA: think Gary, Indiana, in the suburbs of Stockholm.

The whole projection is overlaid by the risk that the economic effects of climate change begin to destroy capital, coastal land and agriculture in the first half of the century, shaving up to 2.5% off world GDP and 6% in south-east Asia.

The bleakest part of the OECD report lies not in what it projects but what it assumes. It assumes, first, a rapid rise in productivity, due to information technology. Three-quarters of all the growth expected comes from this. However, that assumption is, as the report states euphemistically, “high compared with recent history”.

There is no certainty at all that the information revolution of the past 20 years will cascade down into ever more highly productive and value-creating industries. The OECD said last year that, while the internet had probably boosted the US economy by up to 13%, the wider economic effects were probably bigger, unmeasurable and not captured by the market. The veteran US economist Robert Gordon has suggested the productivity boost from info-tech is real but already spent. Either way, there is a fairly big risk that the meagre 3% growth projected comes closer to 1%.


Los gigantes tecnológicos pagan el precio por el caso Snowden

Los gigantes tecnológicos pagan el precio por el caso Snowden.

Un año después de las revelaciones del extécnico de la NSA Edward Snowden, grandes empresas como Microsoft, IBM o Cisco sufren las consecuencias del ciberespionaje practicado por su Gobierno

 

 

Muchos recelan de los sistemas que provienen de Estados Unidos, incluido el mercado chino, esperanza de crecimiento para las tecnológicas.

Muchos recelan de los sistemas que provienen de Estados Unidos, incluido el mercado chino, esperanza de crecimiento para las tecnológicas.

 

El tradicional mimo con el que el Gobierno de Estados Unidos trata a sus empresas nacionales y las impulsa a hacer negocios en todo el mundo se ha visto malogrado en estos últimos 12 meses. Se acaba de cumplir un año desde que las primeras revelaciones de Edward Snowden estamparan las páginas de The Guardian y The Washington Post.

Tras el estupor inicial, el debate sobre la privacidad de los ciudadanos se desarrolla en diferentes países y aparece entre los usuarios la preocupación para evitar la dependencia de la tecnología estadounidense. Y entre los principales afectados se encuentran nombres como IBM, Cisco o Microsoft.

Las empresas de Estados Unidos son las que más tecnología exportan a todo el mundo y la amenaza de posibles puertas traseras en sus sistemas es también una amenaza para su negocio. Apenas un mes después del escándalo, más de 50 compañías pidieron en una carta a Barack Obama permiso para ser más transparentes sobre la información que tenían que pasar al gobierno. Fue el primer intento –tímido– por evitar que sus negocios salieran malparados.

A lo largo de este año transcurrido desde las revelaciones sobre la NSA se han podido comprobar los daños económicos más inmediatos para las compañías tecnológicas e incluso estimar los que podrían darse en el futuro. Aun así existen muchos contratos firmados por varios años, con lo que las verdaderas consecuencias se sabrán a medida que vayan expirando estos contratos.

Microsoft ya ha perdido algunos clientes, tanto es así que el pasado mes de enero anunció que permitirá a los usuarios elegir en qué país se almacenarán sus datos. El golpe más importante para la compañía de Redmond ha sido el plan de Brasil para abandonar el uso de Microsoft Outlook, sustituyéndolo por su propio sistema de correo electrónico, con centros de datos locales. De paso, también se ha cancelado un acuerdo de 4.000 millones de dólares por el que el país carioca iba a comprar aviones de combate a Estados Unidos.

La comunicación entre Brasil y Europa hasta ahora se producía mediante cables submarinos estadounidenses, pero la UE y el Gobierno brasileño han aprobado la construcción de nuevos cables, que correrá a cargo de empresas brasileñas y españolas. Mientras que otros países de Latinoamérica, bajo la bandera de UNASUR, están pensando en la posibilidad de crear su propio sistema de comunicaciones a prueba del espionaje de la NSA.


The Internet With A Human Face – Beyond Tellerrand 2014 Conference Talk

The Internet With A Human Face – Beyond Tellerrand 2014 Conference Talk.

by

maciej-ceglowskil

Maciej Cegłowski

This is the text version of a talk I gave on May 20, 2014, at Beyond Tellerrand in Düsseldorf, Germany.

  1. INTRODUCTION
  2. THE INTERNET REMEMBERS TOO MUCH
  3. THE WEB HAS A CENTER
  4. EVERYONE IS SPYING
  5. THE FOUNDATIONS ARE ROTTEN
  6. REGULATE
  7. DECENTRALIZE
  8. DE-AMERICANIZE
  9. CONCLUSION

INTRODUCTION

Marc [Thiele] emailed me a few weeks ago to ask if I thought my talk would be appropriate to close the conference.

“Marc,” I told him, “my talk is perfect for closing the conference! The first half is this incredibly dark rant about how the Internet is alienating and inhuman, how it’s turning us all into lonely monsters.”

“But in the second half, I’ll turn it around and present my vision of an alternative future. I’ll get the audience fired up like a proper American motivational speaker. After the big finish, we’ll burst out of the conference hall into the streets of Düsseldorf, hoist the black flag, and change the world.”

Marc said that sounded fine.

As I was preparing this talk, however, I found it getting longer and longer. In the interests of time, I’m afraid I’m only going to be able to present the first half of it today.

This leaves me with a problem of tone.

To fix it, I’ve gone through the slides and put in a number of animal pictures. If at any point in the talk you find yourself getting blue, just tune out what I’m saying and wait for one of the animal slides, and you’ll feel better. I’ve tried to put in more animals during the darkest parts of the talk.Look at this guy! Isn’t he great?

10 things we learned from Pew Research's Internet of Things report | Technology | theguardian.com

10 things we learned from Pew Research’s Internet of Things report | Technology | theguardian.com.

Health tech will boom but privacy effects may be ‘pernicious’. Oh, and ‘we will all have cyberservants’

 

 

 

Google Glass is just one path towards the future Internet of Things.
Google Glass is just one path towards the future Internet of Things. Photograph: Andrew Kelly/Reuters

 

It’s been fashionable to drop the phrase “Internet of Things” in tech circles for some time now, but what does it really mean? And just as importantly, what will its effects be in the years to come?

The Pew Research Center Internet Project and Elon University Imagining the Internet Center have been wondering the same thing. They did something about it, too: canvassing more than 1,600 experts about where the Internet of Things will be by 2025.

The resulting report, which was published this afternoon, is a balanced affair, giving plenty of space to Internet of Things sceptics warning about privacy and potential technical gremlins in a world of networked devices talking to one another, as well as exploring the potential benefits.

Here are some of the key quotes and points that stood out when I read the report:


Internet fridges: the zombie idea that will never, ever happen | Technology | theguardian.com

Internet fridges: the zombie idea that will never, ever happen | Technology | theguardian.com.

At the Consumer Electronics Show, LG showed off its ‘internet fridge’ – the latest in 15 years of an appliance that can’t deliver

 

The first touch-screen internet fridge, launched by Electrolux

The first touch-screen internet fridge, launched by Electrolux in 1999. Forget it. Photograph: Martin Argles for the Guardian

 

“This has got to be the coolest gadget yet for the kitchen: a fridge freezer that is hooked up to the internet.”

Breathless words from the frontier of technology – in February 1999. For that’s when that little kernel of text was published on the BBC, introducing “Screenfridge”, which would – it promised – let you send and receive email, watch TV, pay bills and handle personal banking.

And, as it noted, “you can also keep food in it”.

This peculiar dream of the internet fridge just won’t die. Korea’s LG revived this technology zombie once more this week at the International Consumer Electronics Show (CES) in Las Vegas, promising us that you’ll be able to text your fridge and “ask it whether it has milk or butter”.

Reality check: no, you won’t. Well, you might be able to text it, but you shouldn’t rely on the answer.