Feeds

'We must now embrace the tele-phone' - dotcom pundit

A wire-less speaking technology, apparently

  • alert
  • submit to reddit

High performance access to file storage

A year ago Intel demonstrated a small contraption that allows people to talk to each other - even if they're not in the same room, without using wires or string. At the time we saw no possible use for such a device. Dogs, as we know, love fetching sticks - but this seemed to be much too fragile for robust outdoor activity. Intel called this the portable 'tele-phone'.

But now we must mend our ways, shift our gears, and adjust our paradigms once again - for the concept has received a powerful endorsement from one of the dot.com era's most lauded "thinkers".

Clay Shirky, speaking at the O'Reilly ETech blogging conference, now thinks the 'tele-phone' will become an important part of our lives. It may one day be so affordable, he predicted, that even the middle class will be able to buy one. He sketched out a future of people talking into their portable 'tele-phones' as they walked down the street, or sat in their personal hovercraft. Phones would one day be so powerful, Shirky predicted, that they would even allow the user to play a simple naughts and crosses game, written in Python.

A wireless 'Tele-Phone'


One day, wire-less Tele-Phones like this will be everywhere, predicts Shirky

Initially, warned Shirky, only highly Emergent People will be able to find a use for the 'Tele-Phone' - such as webloggers and Wikipedia contributors. But these are your typical "early adoption nodes", he said, and soon ordinary people will figure out how to use the box.

The choice of name, initially puzzling, now becomes clear. 'Phone' is to do with sound and hearing. And 'tele' means telepathic, which is what bloggers are. So if you think of it as a "tele-pathic hearing device," it's quite easy to remember.

The O'Reilly ETech conference is famed for such forward, blue-skies thinking, so put aside your skepticism. And away with your doomsday predictions that the United States' is failing to invest in its technological future by neglecting science education, and by promoting irrationality. Its future is surely fine; on the conference circuit, geniuses are everywhere you look - daring to think what only a couple of years ago was quite unthinkable. ®

Related stories

Intel prototypes portable Tele-Phone
Social software author not miffed by conference shutout
Digital memories: cheap to take, cheaper to lose
Abolish Free TV - Intel lobbyist

High performance access to file storage

More from The Register

next story
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.