Drinking the Ocean How Desalination Works

Total Page:16

File Type:pdf, Size:1020Kb

Drinking the Ocean How Desalination Works Digital blueprints What happened Looking up for buildings to wave power? Mr Wikipedia TechnologyQuarterly June 7th 2008 Drinking the ocean How desalination works TTQCOVERJune.inddQCOVERJune.indd 1 227/5/087/5/08 116:34:326:34:32 The Economist Technology Quarterly June 7th 2008 Monitor 3 Contents On the cover There is lots of water on earth, but 97% of it is too salty for human consumption. As concern grows over water’s scarcity, there is growing interest in desalination, which turns salty water into fresh water. How does it work, and can it provide a quick technological x? Page 20 Monitor 3 Watching while you surf, how Watching while you surf to stop cars, the rise of the low•cost laptop, underground delivery by rail, renumbering the internet, oating wind turbines, smart appliances, monitoring the post, neutron scanning, and new approaches to web browsing Online advertising: New ad•targeting systems, which determine users’ interests by monitoring which websites they visit, are proving controversial Rational consumer S IT a worrying invasion of privacy for to return to work the next day prompts 13 Changing gears web surfers, or a lucrative new business New types of gearbox explained I him to click on an advertisement and model for online advertising? A new book a minibreak for the next weekend. behavioural approach to targeting in• To advertisers, this all sounds great. Computing ternet advertisements, being pioneered by Behavioural•targeting rms are doing the 14 Digital models of buildings companies such as Phorm, NebuAd and rounds in Europe and America o ering From blueprints to databases FrontPorch, is said to be both of these the prospect of working out what web things. The idea is that special software, surfers are thinking, perhaps even before Wave power installed in the networks of internet• they know themselves. If this really 18 The coming wave service providers (ISPs), intercepts web• works, advertisers will be prepared to pay A story of ups and downs page requests generated by their sub• more to place ads, since they are more scribers as they roam the net. The pages in likely to be clicked on. That in turn means Case history question are delivered in the usual way, that websites will be able to charge more 20 Tapping the oceans but are also scanned for particular key• for their advertising slots. A small cut also The rise of desalination words in order to build up a prole of each goes to the ISP that originally gathered the subscriber’s interests. These proles can prole information. Telemedicine then be used to target advertisements The companies involved suggest that more accurately. internet users will welcome all this, since 23 The future of health care Suppose a web user is idly surng a It may be closer than you think more accurate targeting will turn internet travel blog one Sunday afternoon. He advertising from an annoying distraction visits pages containing words such as into a genuinely helpful service. This idea Open•source hardware holiday, ight and hotel. The beha• that we don’t provide a service by doing 25 Open sesame vioural•targeting software watching him this is as far from the truth as it’s possible The virtues of letting everyone in inside the ISP’s network registers and to be, says Kent Ertugrul, the boss of categorises this apparent interest in travel. Phorm. It creates a situation where Brain scan Later, when he logs on to a social•net• there’s less rubbish bombarding you. 27 Truth and consequences working site to see what his friends are up But not everyone likes the idea. Oppo• A prole of Jimmy Wales, the to, advertisements for an airline or hotel nents of behavioural targeting have kicked co•founder of Wikipedia chain pop up alongside the postings and up the biggest fuss in Britain, which is photos. The depressing prospect of having where the technology seems to be making 1 4 Monitor The Economist Technology Quarterly June 7th 2008 2 the most progress: the three biggest ISPs that, by o ering ISPs a chance to get their (BT, Virgin Media and TalkTalk), which hands on a slice of the fast•growing on• together account for around 70% of the line•advertising pie. Behavioural•targeting market, have all signed up to use Phorm’s rms also like to portray themselves as technology. Since news of their plans feisty underdogs taking on mighty Google, emerged in February, over 13,000 people which is itself the cause of concern about have signed an online petition opposing online privacy. Phorm points out that its the system. Legal and networking experts system does not retain detailed informa• have argued that it constitutes an unau• tion about web usage as it builds its user thorised wiretap, and is therefore illegal. prolesin contrast to Google, which Richard Clayton, a computer•security keeps records of users’ search queries for expert at Cambridge University who has up to two years. (The European Commis• taken a close look at Phorm’s systems, did sion recently called upon Google to delete not like what he saw. Proponents of beha• such information after six months.) If vioural targeting, he concluded, assume people knew what was stored right now, that if only people understood all the they’d be shocked, says Phorm’s Mr technical details they’d be happy. I have, Ertugrul. His company’s system, he says, is and I’m still not happy at all. the model for privacy online. Phorm, which is now trying to get Even so, most web users are happy to American ISPs to adopt its technology too, strike an implicit deal with Google: it emphasises that consumers will be given provides an excellent free search engine in the option to opt out of the system if they return for the ability to display relevant do not wish to use it. It points out that advertisements. The quid pro quo with information about individuals’ surng behavioural targeting, says Mr Ertugrul, is habits remains within the custody of the that ISPs will start making money from becoming less e ective as new traction• ISP (which already has access to such online advertising, which they can then control systems become more widely information anyway), and that user pro• spend on upgrading their networks, with• deployed. At the same time, run•at les merely associate keywords with an out raising prices for subscribers. This is a tyres are making another common anonymous serial number, rather than a way of funding the internet, he says. method of stopping a vehicleplacing a name. Its proling system ignores sensi• Behavioural targeting is not necessarily strip of spikes across its pathless e ec• tive pages, such as those from online• a bad idea, but imposing it without telling tive. Even cars with ordinary tyres are not banking sites, and will not be used to people is likely to annoy them when they always incapacitated by the spikes. Some target advertising for pornographic sites. nd out about it. Without adequate dis• career along on their wheel•rims at up to Critics worry, however, that behaviou• closure, an opt out system looks like 160kph (100mph), says Geo rey Alpert, an ral targeting fundamentally undermines snooping; but an opt in system, given all expert in vehicle•pursuit litigation at the the trusting relationship between ISPs and the fuss, now looks like a tough sell. 7 University of South Carolina, in Colum• their subscribers, by allowing a third party bia. The result is a lot of desperate high• to monitor what millions of people are speed chases, one in four of which result doing. They also worry about Phorm’s in someone getting injured, and causing previous behaviour. Until last year it was 400 deaths a year in America alone. known as 121Media, and it gathered in• Stop that car! One way to avoid the need for chases formation about internet users’ interests would be to track felonious vehicles elec• by getting them to download adware, tronically, instead of running after them. which was included in bundles with other StarChase, a company based in Virginia pieces of software. This software then Beach, Virginia, has developed a way to do monitored users’ surng habits and used just that. A pneumatic cannon is mounted the resulting data to target pop up ad• Transport: New technological tricks on the pursuit car. With the help of a vertisements of the kind that once and devices are being developed to guiding laser, it shoots a satellite•based blighted the web. enable police ocers to track and tracking device, smothered in epoxy goo, All this was legal, but it won 121Media halt suspect vehicles onto the target vehicle, allowing the police few friends among PC users, who found to track the suspect without endangering its software dicult to remove from their T MAKES a spectacular sight. To stop a the public. The Los Angeles Police Depart• machines. The revelation that the com• Ieeing car, a pursuing policeman nudges ment plans to deploy the system this year. pany, since renamed Phorm, conducted a the front of his own car against the rear From the police’s point of view, howev• secret trial of its new technology with BT corner of a fugitive vehicle. Then, by er, it would be better if they could actually in 2006 and 2007, monitoring thousands turning into the pursued car, the ocer stop a runaway car by satellite, not just of customers without telling them, has not forces it into a jolting tailspin that brings it track it. General Motors plans to allow helped its image.
Recommended publications
  • A Letter to the FCC [PDF]
    Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of ) ) Amendment of Part 0, 1, 2, 15 and 18 of the ) ET Docket No. 15­170 Commission’s Rules regarding Authorization ) Of Radio frequency Equipment ) ) Request for the Allowance of Optional ) RM­11673 Electronic Labeling for Wireless Devices ) Summary The rules laid out in ET Docket No. 15­170 should not go into effect as written. They would cause more harm than good and risk a significant overreach of the Commission’s authority. Specifically, the rules would limit the ability to upgrade or replace firmware in commercial, off­the­shelf home or small­business routers. This would damage the compliance, security, reliability and functionality of home and business networks. It would also restrict innovation and research into new networking technologies. We present an alternate proposal that better meets the goals of the FCC, not only ensuring the desired operation of the RF portion of a Wi­Fi router within the mandated parameters, but also assisting in the FCC’s broader goals of increasing consumer choice, fostering competition, protecting infrastructure, and increasing resiliency to communication disruptions. If the Commission does not intend to prohibit the upgrade or replacement of firmware in Wi­Fi ​ ​ devices, the undersigned would welcome a clear statement of that intent. Introduction We recommend the FCC pursue an alternative path to ensuring Radio Frequency (RF) compliance from Wi­Fi equipment. We understand there are significant concerns regarding existing users of the Wi­Fi ​ spectrum, and a desire to avoid uncontrolled change. However, we most strenuously advise against prohibiting changes to firmware of devices containing radio components, and furthermore advise against allowing non­updatable devices into the field.
    [Show full text]
  • Building a Scalable Index and a Web Search Engine for Music on the Internet Using Open Source Software
    Department of Information Science and Technology Building a Scalable Index and a Web Search Engine for Music on the Internet using Open Source software André Parreira Ricardo Thesis submitted in partial fulfillment of the requirements for the degree of Master in Computer Science and Business Management Advisor: Professor Carlos Serrão, Assistant Professor, ISCTE-IUL September, 2010 Acknowledgments I should say that I feel grateful for doing a thesis linked to music, an art which I love and esteem so much. Therefore, I would like to take a moment to thank all the persons who made my accomplishment possible and hence this is also part of their deed too. To my family, first for having instigated in me the curiosity to read, to know, to think and go further. And secondly for allowing me to continue my studies, providing the environment and the financial means to make it possible. To my classmate André Guerreiro, I would like to thank the invaluable brainstorming, the patience and the help through our college years. To my friend Isabel Silva, who gave me a precious help in the final revision of this document. Everyone in ADETTI-IUL for the time and the attention they gave me. Especially the people over Caixa Mágica, because I truly value the expertise transmitted, which was useful to my thesis and I am sure will also help me during my professional course. To my teacher and MSc. advisor, Professor Carlos Serrão, for embracing my will to master in this area and for being always available to help me when I needed some advice.
    [Show full text]
  • Security Forum Strategic Panel Phorm Position Paper
    Security Forum Strategic Panel Phorm Position Paper PHORM – PRIVACY IMPACT OF NEW INTERNET ADVERTISING MECHANISMS 1. INTRODUCTION 1.1. Online advertising company Phorm has caused a stir in the Internet community because of its profile-driven service. Phorm has trialled this service with BT, and signed further contracts with Virgin Media and TalkTalk. However, critics claim that the service breaches the Regulation of Investigatory Powers Act (2000), and that Phorm’s approach is contrary to users’ privacy wishes. 1.2. The BCS believes that the solution to this debate rests in self-regulation of online advertising: companies must establish and enforce a code of conduct; be completely transparent about their practices; resist sharing data with third parties; and submit to ongoing oversight from an independent third party organisation. 2. THE BATTLE FOR THE INTERNET 2.1. The massive market for online advertising is one that affects every Internet user: many search engines and websites depend upon advertising revenues for funding, and some ISPs use advertising to subsidise subscription costs. In the absence of those funding sources they would either have to pass on additional operating costs to users, or cease trading altogether. 2.2. The battle for control of Internet advertising had, until recently, been confined to a small number of (rapidly consolidating) players including the likes of Microsoft, Google, Yahoo! and DoubleClick. These well-established companies have built their offerings over many years and believed themselves to control the market, with little threat from new companies. 2.3. However, a new breed of online advertising company has recently appeared.
    [Show full text]
  • Site Finder and Internet Governance
    345 Site Finder and Internet Governance Jonathan Weinberg* 347 INTRODUCTION 348 PART 1. 354 PART 2. 361 PART 3. 366 PART 4. 375 CONCLUSION Copyright © 2004 by Jonathan Weinberg. * Professor of Law, Wayne State University. I am grateful to Michael Froomkin, Mark Lemley, David Maher, Milton Mueller, and Jessica Litman for their comments, and to Susan Crawford and Bret Fausett for answer- ing questions along the way. None of them, of course, is responsible for anything I say here. This essay reflects developments taking place through 30 November 2003. 347 Site Finder and Internet Governance Jonathan Weinberg INTRODUCTION ON SEPTEMBER 15, 2003, VeriSign, Inc.—the company that operates the data- bases that allow internet users to reach any internet resource ending in “.com” or “.net”—introduced a new service it called Site Finder. Less than three weeks later, after widespread protest from the technical community, at least three law- suits, and a stern demand from ICANN (the Internet Corporation for Assigned Names and Numbers, which has undertaken responsibility for managing the internet domain name space), VeriSign agreed to shut Site Finder down.1 In between those dates the internet community saw a passionate debate over the roles of ICANN, VeriSign, and the internet’s technical aristocracy in managing the domain name space. VeriSign has charged that its opponents’ reactions were the product of “obsolete thinking” that would disable it from “build[ing] a commercial busi- ness.”2 ICANN, for its part, is seeking to enact a procedure under which top-level domain name registry operators such as VeriSign must seek ICANN’s approval before offering new services or taking any “significant actions that...could affect the operational stability, reliability, security or global interoperability of...the Internet.”3 Some see fault on all sides: “It’s hard to say,” writes one commenta- tor, “in this case who is being more anti-competitive, ICANN or VeriSign.”4 In this essay, I will try to unpack the Site Finder story.
    [Show full text]
  • To the Members of the Senate Judiciary Committee: We, The
    To the members of the Senate Judiciary Committee: We, the undersigned, have played various parts in building a network called the Internet. We wrote and debugged the software; we defined the standards and protocols that talk over that network. Many of us invented parts of it. We're just a little proud of the social and economic benefits that our project, the Internet, has brought with it. We are writing to oppose the Committee's proposed new Internet censorship and copyright bill. If enacted, this legislation will risk fragmenting the Internet's global domain name system (DNS ), create an environment of tremendous fear and uncertainty for technological innovation, and seriously harm the credibility of the United States in its role as a steward of key Internet infrastructure. In exchange for this, the bill will introduce censorship that will simultaneously be circumvented by deliberate infringers while hampering innocent parties' ability to communicate. All censorship schemes impact speech beyond the category they were intended to restrict, but this bill will be particularly egregious in that regard because it causes entire domains to vanish from the Web, not just infringing pages or files. Worse, an incredible range of useful, law-abiding sites can be blacklisted under this bill. These problems will be enough to ensure that alternative name-lookup infrastructures will come into widespread use, outside the control of US service providers but easily used by American citizens. Errors and divergences will appear between these new services and the current global DNS, and contradictory addresses will confuse browsers and frustrate the people using them.
    [Show full text]
  • IDN-OSS Project
    IDN-OSS Project ICANN 2004 Cape Town – IDN Workshop 1st December 2004 William Tan NeuLevel Consultant IDN and NeuLevel • NeuLevel has recognized the need for application plug-ins to realize the benefit of IDN work by any registry – Web browsers, email clients, IM, etc. • Need for a project to implement plug-ins that is – Open source, external to NeuLevel – Community controlled and developed – Standards compliant, not registry-specific 2 Chartering IDN-OSS • NeuLevel collaboration with James Seng to begin IDN-OSS – Conceived at ICANN Montreal – Discussion between Richard Tindal and James Seng • James Seng wrote business plan, kick-started the project. • Advisory Council: Vint Cerf, Mark Davis, Martin Dürst, John Klensin, and Paul Hoffman • Project is hosted by Internet Systems Consortium 3 IDN Open Source Software Project • Goals – Develop open source, standards-compliant software to enable IDN functionality in applications – Target web browser initially – Internet Explorer – Provides a bridge until IDN functionality is native to applications • Timeline – Summer 2003: Project begins – Fall 2003: ISC begins hosting project – Spring 2004: First IE plug-in released – Summer 2004: Internal code improvements 4 IDN-OSS Products • IDNTool • Performs IDNA ToASCII and ToUnicode operations. • Useful for developers, domain administrators, etc. • Uses JPNIC idnkit library internally • Plug-in for Internet Explorer • Allows users to navigate using IDN URLs – by typing into address bar or clicking on links. • New name: echIDNA • Uses JPNIC idnkit library
    [Show full text]
  • Phorm PIA Interim
    80/20 Thinking Ltd: Interim PIA for Phorm Inc 1 80/20 Thinking Ltd First Stage (Interim) Privacy Impact Assessment For Phorm Inc. February 10, 2008 80/20 Thinking Limited Registered office: 4th floor, 18 Pall Mall, London, SW1Y 5LU Company number 06483833 80/20 Thinking Ltd: Interim PIA for Phorm Inc 2 INTRODUCTION Phorm Inc has engaged 80/20 Thinking Ltd to deliver a Privacy Impact Assessment (PIA) as an integrated component of product development and deployment of its technology. This document serves as an Interim (first stage) report that will lead to the publication of a full PIA in March 2008. The commissioned work involves the following elements: • Scoping the technology and engineering elements to assess privacy functionality. • Assessment of due diligence and compliance aspects. • Conducting a full risk assessment of presentational and other elements of the product launch and deployment. • Working collaboratively to develop a sustainable privacy framework within the organisation. • Conducting privacy training to all Phorm staff. • Auditing the privacy policies. • Developing an outreach and stakeholder engagement process. • Creating a rapid response privacy reporting & response regime. • Follow-up for nine months, involving meetings with the executive team. As this assessment is being conducted relatively late in the lifecycle of Phorm’s product deployment, 80/20 Thinking has developed a “late stage implementation” PIA model that aims to satisfy most, if not all, of the criteria of a “full product cycle” PIA. This model is specifically designed to assist the implementation of a risk mitigation strategy for the implementation and lifecycle of IT projects that either involve personal data or which deploy potentially complex or controversial technologies and techniques.
    [Show full text]
  • Hacking Roomba®
    Hacking Roomba® Tod E. Kurt Wiley Publishing, Inc. Hacking Roomba® Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN-13: 978-0-470-07271-4 ISBN-10: 0-470-07271-7 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services.
    [Show full text]
  • Wikia Search: La Transparencia Es Un Arma Cargada De Futuro Por Fabrizio Ferraro
    Wikia search: la transparencia es un arma Cargada de futuro Por Fabrizio Ferraro Lo que hace de Wikia Search un proyecto potencialmente innovador no es ni la intervención del Claves factor humano ni la calidad de los resultados de las búsquedas. Su posible ventaja competitiva es la transparencia, que podría convertirlo en el buscador más 1 Wikia Search se basa en el concepto del wiki, un término fiable en cuanto a la neutralidad de sus resultados. que designa a las sedes web que se nutren de los Sin embargo, Wikia Search no ha empezado con buen pie. contenidos que aportan los propios usuarios. El ejemplo “Una de las mayores decepciones que he tenido la de wiki más célebre es desgracia de tener que comentar”, se afirma en la crítica Wikipedia, que Nielsen situaba en noveno lugar en el del influyente blog de tecnología TechCrunch. La mayoría ranking de sedes más de artículos de la prensa y de los blogs reflejan visitadas por los internautas sentimientos parecidos. Es una reacción chocante por estadounidenses a finales de 2007. cuanto han sido estos mismos medios los que han creado más expectativas sobre el nuevo motor de búsqueda “social” llamado a disputarle el trono a Google. El buscador de Wikia 2 Search utiliza tecnología de Las críticas se han ensañado especialmente con los código abierto que, paupérrimos resultados que arroja el nuevo motor de contrariamente a la que utilizan sus rivales, permite a búsqueda en comparación con los que ofrece Google. los propios usuarios aportar Tampoco ha gustado que la tan cacareada intervención mejoras a los algoritmos que humana en la ordenación de los resultados no esté ordenan los resultados del buscador.
    [Show full text]
  • Shunned Profiling Technology on the Verge of Comeback
    Dow Jones Reprints: This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers, use the Order Reprints tool at the bottom of any article or visit www.djreprints.com See a sample reprint in PDF format. Order a reprint of this article now WHAT THEY KNOW November 23, 2010, 11:31 p.m. ET Shunned Profiling Technology on the Verge of Comeback By STEVE STECKLOW and PAUL SONNE One of the most potentially intrusive technologies for profiling and targeting Internet users with ads is on the verge of a comeback, two years after an outcry by privacy advocates in the U.S. and Britain appeared to kill it. The technology, known as "deep packet inspection," is capable of reading and analyzing the A History of Phorm "packets" of data traveling across the Internet. It can be far more powerful than "cookies" and other techniques commonly used to track people online because it can be used to monitor all online activity, not just Web browsing. Spy agencies use the technology for surveillance. Now, two U.S. companies, Kindsight Inc. and Phorm Inc., are pitching deep packet inspection services as a way for Internet service providers to claim a share of the lucrative online ad market. Kindsight and Phorm say they protect people's privacy with steps that include obtaining their consent. They also say they don't use the full power of the technology, and refrain from reading email and analyzing sensitive online activities. Use of deep packet inspection this way would nonetheless give advertisers the ability to show ads More interactive graphics and photos to people based on extremely detailed profiles of their Internet activity.
    [Show full text]
  • Raspberry Pi Market Research
    Raspberry Pi Market Research Contents MARKET ................................................................................................................................................... 3 CONSUMERS ............................................................................................................................................ 8 COMPETITORS ....................................................................................................................................... 12 Element14 ......................................................................................................................................... 12 Gumstix- Geppetto Design ............................................................................................................... 14 Display Module .................................................................................................................................. 17 CoMo Booster For Raspberry Pi Compute Module (Geekroo Technologies ) ................................... 18 2 MARKET When the first Raspberry PI (Pi) was released in February 2012 it made a big impact that extended well beyond the education world for which it was touted. The Pi became a staple amongst the hobbyist and professional maker communities and was used for building everything from media centers, home automation systems, remote sensing devices and forming the brains of home made robots. It has recently been announced that over 5m Raspberry Pi’s have been sold since its inception, making it the best selling
    [Show full text]
  • I.Mx6 Quad Reference Manual
    I.mx6 quad reference manual Continue ‹ The SAA template is considered for a merger. › The neutrality of this Article is in dispute. The conversation page can be found with a proper discussion. Do not remove this message until the conditions for doing so have been met. (October 2018) (Learn how and when to remove this template message) The i.MX range is the Freescale Semiconductor family (now part of NXP) proprietary microcontrometers for arm-based multimedia applications that focus on low energy consumption. Processors i.MX are SoCs (System-on-Chip), which include a number of processing units in one die, such as the main CPU, the video processing unit and the graphics processing unit, for example. Products i.MX are trained in automotive, industrial and consumer markets. Most are guaranteed for a production life of 10 to 15 years. [1] Many devices use i.MX processors, such as Ford Sync, Kobo eReader, Amazon Kindle, Zune (except Zune HD), Sony Reader, Onyx Boox readers/tablets, SolidRun SOM's (including CuBox), Purism's Librem 5, some Logitech Harmony remote control squeeze ibox radio, some Toshiba Gigabeata mp4 players. The range i.MX was formerly known as the DragonBall MX family, the fifth generation of DragonBall microcontrofiers. i.MX originally meant innovative multimedia eXtension. Solutions i.MX hardware (processors and development boards) and processor-optimized software. i.MX 1 series Freescale DragonBall MX-1 Microprocessor (BGA package). The series was later renamed i.MX. In 2001/2002, the i.MX / MX-1 was based on the arm920T architecture. i.MX1 = 200 MHz ARM920T i.MXS = 100 MHz ARM920T i.MXL = 150-200 MHz ARM920T i.MX 2 series series i.MX2x is a family of processors based on ARM9 architecture (ARM926EJ-S) designed in CMOS 90 nm process.
    [Show full text]