28
04
2025

PAGES

28
04
2025

spot_img

PAGES

Home Blog Page 6626

Android with App Inventor

0

Google App Inventor is an application provided by Google that allows anyone to create software applications for the Android OS. It uses a graphical interface, very similar to Scratch and the StarLogo TNG user interface, that allows users to drag-and-drop visual objects to create an application that can run on the Android system, which runs on many mobile devices.

 

Course Outline

Overview

  • What is App Inventor?
  • What you can do with App Inventor

Setup

  • Preparing your System
  • Installing the tools
  • Hello, Android

Components

  • Basic components
  • Media components
  • Animation components
  • Social components
  • Sensor components
  • Screen Arrangement components
  • LEGO® MINDSTORMS® components
  • Other components

Blocks

  • Definition blocks
  • Text blocks
  • List blocks
  • Math blocks
  • Logic blocks
  • Control blocks
  • Color blocks

Concepts

  • Using the Activity Starter
  • Creating a Custom TinyWebDB Service
  • Live Development, Testing, and Debugging
  • Displaying a List
  • Using the Location Sensor
  • Specifying Sizes of Components
  • Accessing Images and Sounds

Labs 1- 5

 

For more, visit Fasmicro Android Division, Owerri, Nigeria

Beyond Customer Need and Expectation, Perception is King of Market

1

We are used to hear organizations talk about meeting the needs of their customers. Need and want are major concepts in elementary economics. It could be confusing initially, but for good students, they always master the differences. While deficiency of need could cause severe negative outcome, want is not that critical. Nonetheless, there exist subjectivities in classifying individual or personal needs and wants; a topic for another day.

So, from high school to business school, we are taught that understanding your customers’ needs is very critical in surviving as a business concern. Based on this, many inexperienced marketing directors develop models and strategies upon which their organizations align their products and services for the market. They anchor their organic growth and survivability solely on meeting those needs in the market.

Unfortunately, meeting the customer needs is not enough. You must exceed the needs if you want to remain relevant in the market. The 21st century is not a century of market needs; it is one that requires more than meeting needs. Why? Technology disrupts the habits of the customer so fast that if you focus on needs, you will never be an industry leader. For early adopting customers, it would be very difficult to keep them loyal by just meeting their needs. They want more from you.

They want you to understand what their expectations are. Expectation here has to do with meeting their present need and understanding that they need more than what you are giving them. It could be like a customer who wants to heat his house. He lives green, but he heats his house with dirty coal. It makes him very unhappy that he preaches green lifestyle but cannot power the house with green technology. His income cannot support investment in solar panels.

He was expecting the utility firm to provide something greener than coal. His needs are met; yet, he expected more than that. Agile firms will go to serve that expectation and win the customer. It is being conscious that even though the needs are met, we know customers expect more from us. When firms work hard to meet customer expectations, they become innovative in the process.

While expectation can help you stay in the game, what firms really need to do is to meet the perception of customers. Perception is the king of all marketing. Unfortunately, few firms get to that level. Excellent innovative technology is required to play at this level. It is risky because if you get it wrong, you can harm your organization. Perception is providing to customers what they never expected or imagined they needed. But the day they see the product (or rarely service), they will embrace it en mass.

For all the modern firms, Apple is among the few that play at this level. Apple provides products that exceed expectation; yet, customers never actually asked for them. They just arrived and we all embraced them. It is beyond expectation because you never thought about their possibilities or existence. It was more than need because you knew nothing about the constructs of those products. But the day you see them on TV, you will go for them. Apple’s iPod is a good example.

Before it came, very few people, excluding Steve Jobs and company imagined that such could be accommodated in this planet. When iPhone prototype was shown to Verizon, they rejected it because (I suspect) they lacked the capacity of understanding customer perfection. There was nothing to benchmark iPhone because there was none like it. Products that fit this category do not need focus groups during development because those insights make no sense. Unless the product is ready, many customers cannot imagine it. It is an abstractive product that becomes real when you see a completed version.

The interesting thing is that all products that succeed at the level of perception are usually disruptive in their sector or industry. Google search cannot be considered to fall in the category of perception because many people already craved for better search because neither Microsoft nor Yahoo was offering a good one. So a product could be disruptive and yet not a percepting product. However, all percepting products are disruptive.

Succeeding in markets today will require understanding what the customer perceptions are. While meeting their expectations is a good business model, the risk to that is that one technology can immediately shift their expectations. If you have a fast device today, they will expect a faster one in six months; it is a cycle of marginal innovation. However, if one creates a percepting device that works, your business will be in trouble. Ask the film camera industry; they were meeting the expectations of film photography, until the day digital camera arrived and they lost more than 90% of their customers. So, make meeting your customer perception the lifeblood of your organization strategy.

In a research during my business school, I discovered that the most profitable customers are those whose perceptions are met. They become more loyal and you can have great margins while serving them. This research was done in Lagos (Nigeria). I developed a three-segment pseudo pyramid where Need is at the bottom, Expectation at center and Perception at the top. The percepting customers are the most sophisticated to service. If you can nurture and keep them, you become the king of your market. They are willing agents that enable disruption in market composition and are innovation-tasty early adopters.

Starcomms Unveils 50 Hr Internet Package

0

 

Starcomms has unveiled 50 hr internet package to better serve its customers.

 

The 50-hour package on iZAP according to Starcomms, costs N3990 while the 1x component costs N2500. The service will last four fourteen days before a customer can recharge again. Before now, the lowest data subscription hourly planed for Starcomms Internet access was 100hours.

 

To make use of the 50 hour package, customers can recharge with their Starcomms phones, with recharge card and through Starcomms website. The code for iZAP 50-hour plan is 249. This means that all the customers’ needs to do is recharge their Starcomms phones up to N4, 000 and send SMS to (*249*data device number*1234#) to 37938.

 

Microsoft Nigeria Hosts Informational for Non-Profit – June 15, Abuja

0

Microsoft Nigeria and Paradigm Initiative Nigeria will hold an informational for non-profit organizations:

 

Venue: Abuja

 

Date:  June 15 and 16, 2011.

 

Nigeria’s non-profit institutions play a major role as they connect citizens with diverse services that they would otherwise have had no access to. Many of these NGOs work in rural areas or with underserved groups and could benefit a lot by employing the use of ICT tools. Building on Microsoft’s work around giving much-needed support to NGOs across the world and the previous edition of the NGO Connection Day in Lagos, hosting a Microsoft NGO Academy in Abuja will help fill a huge gap that will improve organizational efficiency while also helping many non-profits save cost.

 

The Academy will offer an interactive capacity-building program to further enhance skills in ICT, allow NGO staffs learn more about Microsoft’s opportunities for non-profits, provide technical demonstrations of Microsoft products and give NGOs the opportunity to network with relevant institutions. Participants of an earlier edition that held in Lagos opined that the NGO Connection Day event gave them the opportunity to discuss technology use in their work, learn more about technology tools and establish faster online presence that helped make their information available to a much wider audience.

 

This edition’s program will end with a closing ceremony where the winner of the Tech4Dev Award will be announced. The new Tech4Dev Award will honour the participating non-profit organization that demonstrates the best use of technology in their development work. This event is primarily for non-profits whose representatives are in Abuja, or are able to join us in Abuja as only lunch and course materials will be taken care of.

 

Registration is on PIN site

Leakage Control Techniques in Nanometer CMOS

0

Among the different leakage currents in the nanometer CMS, the subthreshold and gate leakage are the most dominant. While the latter is mainly due to electron tunnelling from the gate to the substrate, the former is caused by many other factors. As a result, the leakage control techniques to be discussed will focus more on subthreshold currents. Over the years, many techniques have been developed to reduce the subthreshold currents in both the active and standby modes in order to minimize the total power consumption of CMOS circuits.

 

While the standby leakage currents are wasted currents when the circuit is in idle mode where no computation takes place, the active leakage currents are wasted current when the circuit is in use. Generally, reduction of leakage currents involves application of different device and circuit level techniques. At the device level, it involves controlling the doping profiles and physical dimensions of transistors while at the circuit level, it involves the manipulation of threshold voltage (Vth) and source biasing of the transistor.

 

A. Circuit Level Leakage Control Techniques

i) Multi Vth Techniques
This technique involves fabrication of two types of transistors, high Vth and low Vth transistors, on a chip. The high Vth is used to lower the subthreshold leakage current, while the low Vth is used to enhance performance through faster operation. Obtaining these different types of transistors is done through controlled channel doping, different oxide thickness, multiple channel lengths or multiple body biases. Notwithstanding, with technology scaling and continuous decrease in the supply voltage, the implementation of the high Vth transistor will become a major practical challenge.

 

Dual threshold method
In logic circuits, leakage current can be reduced by assigning higher Vth to devices in non-critical paths, while maintaining performance with low Vth in the critical paths. This technique is applicable to both standby and active mode leakage power dissipation control. It ensures that the circuit operates at a high speed and reduced power dissipation.

 

Multi-Threshold Voltage Method
This method uses a high Vth device to gate supply voltage from a low Vth logic block thereby creating a virtual power rail instead of directly connecting the block to the main power rail. The high Vth switches are used to disconnect the power supplies during the standby state, resulting in very low leakage currents set by the high Vth of the series logic block. In active mode operation, the high Vth transistors are switched on and the logic block, designed with low Vth, operates at fast speed.

 

This enables leakage current reduction via the high Vth and enhanced performance via the low Vth block. Alternatively, this system could be implemented with a high Vth NMOS transistor connected between the GND and the low Vth block. The NMOS transistor insertion is preferred to the PMOS since it has a lower ON-resistance at the same width and consequently can be sized smaller. The use of these transistors increases circuit delay and area. Besides, to retain data during standby mode, extra high Vth memory circuit is needed.

 

Variable Vth Method
This is a method mainly used to reduce standby leakage currents by using a triple well process where the device Vth is dynamically adjusted by biasing the body terminal. Through application of maximum reverse biasing during the standby mode, Vth is increased and the subthreshold leakage current minimized. In addition, this method could be applied in active mode operation to optimize circuit performance by dynamically tuning the Vth based on workload requirements. Through this tuning capability, the circuit is able to operate at the minimal active leakage power.

 

Dynamic Vth Method
This is a method used in active mode operation to control the leakage current in a circuit based on the desired frequency of operation. The frequency is dynamically adjusted through a back-gate bias in response to workload of a system. At low workload, increasing the Vth reduces the leakage power.

 

ii) Body Bias Control
Body biasing a transistor is an effective way of reducing both the active and standby leakage through its impact of increasing the threshold voltages of the MOS transistors. By applying a reverse body bias, the Vth is increased and subsequently reduces the subthreshold leakage currents. This could be done during standby mode by applying a strong negative bias to the NMOS bulk and connecting the PMOS bulks to the VDD rail. Body biasing is also used to minimize DIBL effect and Vth-Rolloff associated with SCE. The Variable Threshold CMOS technique described above utilises body biasing to improve circuit performance. It is important to note that the Vth is related by the square root of the bias voltage implying that a significant voltage level would be needed to raise the Vth. This could be a potential challenge in the UDSM where the supply has been severely scaled down.

 

iii) Minimum Leakage Vector Method
The fundamental concept in this technique is to force the combinational logic of the circuit into a low-leakage state during standby periods. This state enables the largest number of transistors to be turned off so as to reduce leakage and make use of multiple off transistors in stacks.

 

iv) Stack Effect-based Method

The “stacking effect” is the reduction in subthreshold current when multiple transistors connected in series (in a stack) are turned off. The transistor stacking increases the source bias of the upper transistors in the stack as well as lowers the gate-source voltage (Vgs) of these transistors. All these effects contribute to lower subthreshold leakage current in the circuit. Minimizing leakage through transistor stacking depends on the pattern of the input sequence during standby periods as it determines the number of OFF transistors in the stack.

 

Finding the low leakage input vector involves either a complete enumeration of the primary inputs or random search of the primary inputs. While the former is used for small circuits, the latter is applied for more complex circuits. The idea is to use the input vector to determine the combination that results to the least leakage current. When the input vector is obtained, the circuit is evaluated and if necessary, additional leakage control transistors are inserted in series at the non-critical paths to be turned OFF during the standby mode.

 

B. Device Level Leakage Control Techniques

 

Silicon-on-insulator (SOI): This is a non-bulk technology that builds transistors on top of insulating layer instead of a semiconductor substrate. Using insulating layer reduces parasitic capacitance, which results to higher operational speed and lower dynamic power dissipation in integrated circuits. Though the early SOI used crystals like sapphire, emerging technologies favour the use of silicon wafer, making it economically attractive. The ITRS 2005 projects the use of Ultra-thin body (UTB) SOI by 2008 to manage the increasing effects of leakage.

 

Double Gate MOSFET (DG-MOS): In traditional bulk and SOI devices, immunity from SCE like Vth-rolloff and DIBL requires increasing the channel doping to enable reduction of the depletion depth in the substrate. The inherent drawbacks to this approach are increased substrate-bias sensitivity and degraded subthreshold swing. By replacing the substrate with another gate to form a double gate MOSFET, short channel immunity is achieved with an ideal subthreshold swing.

 

Separation by Implantation of Oxygen (SIMOX): This is a more modern and elegant technique for making the SO1 structure by implanting heavy doses of oxygen directly into a silicon substrate. The wafer is then annealed at very high temperatures, which induces oxide growth below the wafer surface and pushes a top layer of silicon on the top. The resulting SOI consumes lesser power than the bulk technologies. Other methods used in device level control include retrograde doping and halo doping.

 

In addition to the two techniques discussed above, system and architectural level techniques are also used in leakage reduction. This technique could involve designing the system architecture so that it operates at low voltage. The underlining strategy is that when the system operates at low voltage, it reduces both the static and dynamic power consumption and consequently minimizes the leakage power. One of the ways of doing this is to design the system using pipeline architecture. With pipelining, it is possible to operate the system at lower voltage without performance degradation.

 

The penalty for this technique is extra hardware required for pipelining. Another method is threshold voltage hopping. This involves the use of software to dynamically control the threshold voltage of transistors based on the workloads of the system. By adjusting the threshold voltage in this way, high percentage power savings could be realised in a system. Furthermore, reduction in supply voltage is also a good technique to reduce leakage power. By lowering supply voltage, the source-drain voltage is reduced. This has the effect of minimizing DIBL, gate and subthreshold leakage currents.

author/ndubuisi ekekwe