Feeds

Low-cost Aakash tablet scheme is back on track

Smarter, better, faster, stronger

Secure remote control for conventional and virtual desktops

A new version of the ultra low-cost Aakash tablet built by British firm DataWind has been announced by the Indian Institute of Technology-Bombay (IIT-B), with deliveries to over 100,000 students and teachers nationwide expected from July.

The institute took over the project – designed to empower students and teachers in the country’s engineering colleges – three months ago from IIT-Jodhpur, after a deteriorating relationship with DataWind stalled shipments.

Now it has commissioned the Aakash 2, which upgrades the processor from 366 Mhz to 800 Mhz, and replaces the resistive touch screen to a capacitive screen.

It also features improved battery power, up from less than two hours to around three hours, and has a slightly lower price tag of Rs. 2,263 (£25.48), down from 2,276 (£25.63 ), according to IIT-B.

The devices will be used to facilitate an ambitious remote teacher training programme which aims to engage 1,000 trainee teachers at a time. IIT-B is also developing open source applications for use with the tablets with a special focus on content in India languages, the institute said.

The devices are already set-up to facilitate interactive video lectures, online tests and the submission of assignments and can also be used by computer students to write and run programs in C, C++ and Python.

DB Phatak, head of the project at the IIT-B’s Computer Science Engineering department, said the following in a canned statement:

With the increasing convergence of communication and computing technologies, tablet computers are fast emerging as popular consumer devices. In coming years, Aakash is likely to become a ubiquitous tool in the hands of students, at all levels of their education.

We received first 100 samples of the Aakash-2 device during May/June. Our goal is to complete the deployment at over 500 engineering colleges, and to build a large community of thousands of talented professional students and teachers from these colleges, to carry out large scale development of applications and content for use in all schools and colleges.

®

Beginner's guide to SSL certificates

More from The Register

next story
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.