Feeds

Low-cost Aakash tablet scheme is back on track

Smarter, better, faster, stronger

Gartner critical capabilities for enterprise endpoint backup

A new version of the ultra low-cost Aakash tablet built by British firm DataWind has been announced by the Indian Institute of Technology-Bombay (IIT-B), with deliveries to over 100,000 students and teachers nationwide expected from July.

The institute took over the project – designed to empower students and teachers in the country’s engineering colleges – three months ago from IIT-Jodhpur, after a deteriorating relationship with DataWind stalled shipments.

Now it has commissioned the Aakash 2, which upgrades the processor from 366 Mhz to 800 Mhz, and replaces the resistive touch screen to a capacitive screen.

It also features improved battery power, up from less than two hours to around three hours, and has a slightly lower price tag of Rs. 2,263 (£25.48), down from 2,276 (£25.63 ), according to IIT-B.

The devices will be used to facilitate an ambitious remote teacher training programme which aims to engage 1,000 trainee teachers at a time. IIT-B is also developing open source applications for use with the tablets with a special focus on content in India languages, the institute said.

The devices are already set-up to facilitate interactive video lectures, online tests and the submission of assignments and can also be used by computer students to write and run programs in C, C++ and Python.

DB Phatak, head of the project at the IIT-B’s Computer Science Engineering department, said the following in a canned statement:

With the increasing convergence of communication and computing technologies, tablet computers are fast emerging as popular consumer devices. In coming years, Aakash is likely to become a ubiquitous tool in the hands of students, at all levels of their education.

We received first 100 samples of the Aakash-2 device during May/June. Our goal is to complete the deployment at over 500 engineering colleges, and to build a large community of thousands of talented professional students and teachers from these colleges, to carry out large scale development of applications and content for use in all schools and colleges.

®

Boost IT visibility and business value

More from The Register

next story
Apple takes blade to 13-inch MacBook Pro with Retina display
Shaves price, not screen on mid-2014 model
iPhone 6 flip tip slips in Aussie's clip: Apple's 'reversible USB' leaks
New plug not compatible with official Type-C, according to fresh rumors
FEAST YOUR EYES: Samsung's Galaxy Alpha has an 'entirely new appearance'
Wow, it looks like nothing else on the market, for sure
YES YES YES! Apple patents mousy, pressure-sensing iVibrator
Fanbois prepare to experience the great Cupertin-O
Steve Jobs had BETTER BALLS than Atari, says Apple mouse designer
Xerox? Pff, not even in the same league as His Jobsiness
TV transport tech, part 1: From server to sofa at the touch of a button
You won't believe how much goes into today's telly tech
Apple analyst: fruity firm set to shift 75 million iPhones
We'll have some of whatever he's having please
Things are looking up in Flappy Bird sequel
'Swing Copters' offers the same gameplay but in a different direction
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.