วันพุธที่ 16 กันยายน พ.ศ. 2552

Firm place to stand outside solar system

Found: Firm place to stand outside solar system



WASHINGTON – Astronomers have finally found a place outside our solar system where there's a firm place to stand — if only it weren't so broiling hot.
As scientists search the skies for life elsewhere, they have found more than 300 planets outside our solar system. But they all have been gas balls or can't be proven to be solid. Now a team of European astronomers has confirmed the first rocky extrasolar planet.
Scientists have long figured that if life begins on a planet, it needs a solid surface to rest on, so finding one elsewhere is a big deal.
"We basically live on a rock ourselves," said co-discoverer Artie Hatzes, director of the Thuringer observatory in Germany. "It's as close to something like the Earth that we've found so far. It's just a little too close to its sun."
So close that its surface temperature is more than 3,600 degrees Fahrenheit, too toasty to sustain life. It circles its star in just 20 hours, zipping around at 466,000 mph. By comparison, Mercury, the planet nearest our sun, completes its solar orbit in 88 days.
"It's hot, they're calling it the lava planet," Hatzes said.
This is a major discovery in the field of trying to find life elsewhere in the universe, said outside expert Alan Boss of the Carnegie Institution. It was the buzz of a conference on finding an Earth-like planet outside our solar system, held in Barcelona, Spain, where the discovery was presented Wednesday morning. The find is also being published in the journal Astronomy and Astrophysics.
The planet is called Corot-7b. It was first discovered earlier this year. European scientists then watched it dozens of times to measure its density to prove that it is rocky like Earth. It's in our general neighborhood, circling a star in the winter sky about 500 light-years away. Each light-year is about 6 trillion miles.
Four planets in our solar system are rocky: Mercury, Venus, Earth and Mars.
In addition, the planet is about as close to Earth in size as any other planet found outside our solar system. Its radius is only one-and-a-half times bigger than Earth's and it has a mass about five times the Earth's.
Now that another rocky planet has been found so close to its own star, it gives scientists more confidence that they'll find more Earth-like planets farther away, where the conditions could be more favorable to life, Boss said.
"The evidence is becoming overwhelming that we live in a crowded universe," Boss said.
___
On the Net:
European Southern Observatory: http://www.eso.org/

วันพุธที่ 8 เมษายน พ.ศ. 2552

Police fight back on laser threat

There has been a "phenomenal" increase in the number of incidents in which aircraft are targeted by small hand-held lasers, according to UK police.

In 2008, there were 69 times as many such incidents as in 2003.

The Civil Aviation Authority has set up a task force to respond to the threat of pilots becoming disorientated.

The police have new devices designed to record and analyse laser "strikes" on their aircraft, tracking their source and leading to arrests of attackers.

The BBC gained exclusive access to an exercise trialling these "Laser Event Recorders" carried out by the air support unit of Greater Manchester Police.

Direct hit

Laser shining in helicopter cockpit
In the cockpit the light can be blinding

"We had one yesterday," said veteran police helicopter pilot, Mike Briggs. "You're in no doubt when you've been targeted by one of these lasers."

An "attack" can come from any of the darkened streets over which the force's state of the art helicopter India 99 flies at night.

"You can't miss it. A sharp green beam of light shoots up from the ground, flashing around the helicopter, dazzling anyone on whom it scores a 'direct hit'," said Mr Briggs.

The police have had to learn to deal with the attacks -- about half of those reported are aimed at their helicopters. In 2003 just three incidents were recorded. Last year there were 207. So far this year, the tally is 76.

The culprits are usually bored youths, who have got hold of a laser pointer and amuse themselves by playing its beam over passing aircraft.

But from now on they are far more likely to get caught, and get sent to prison.

The Greater Manchester Police air support unit arranged an exercise for the BBC to show how their response has been stepped up.

COMBATING LASER POINTER ATTACKS
Graphic showing how laser event recorder works
1 Police helicopter is targeted by laser pointer on the ground
2 Helicopter crew use hand-held Laser Event Recorder to locate pointer. It records wavelength to match beam to pointer - like matching bullet to a gun
3 GPS details enable helicopter's thermal image camera to find suspect and police patrol on ground is directed to address

After informing air traffic control and local police stations we lift off from the police helipad at Barton aerodrome and head for Bolton.

In a residential back garden there is an officer with a cheap laser pointer is waiting. We've agreed not to reveal where he bought it, but its beam is incredibly powerful.

As the helicopter flies by he switches it on, and aims for our windows. Inside the aircraft the light flickers eerily between the three crew members.

When it is right in your eyes, you simply can't see anything else. We are 1200ft (365m) up, but the beam is strong and sharp.

If we were within 500ft there would be a real possibility of eye damage, but at our altitude the risk is of distraction and disorientation.

Not helpful when flying a helicopter. The police also say it stops them concentrating on the job in hand, often a car pursuit on the ground with busy radio traffic.

But India 99's rear observer now has a secret weapon.

Eye in the sky

Event recorder in front of helicopter
The Event Recorder logs everything

The Laser Event Recorder not only takes a picture of the attack and logs where it came from using GPS, but also analyses the wavelength of the laser being used.

It can also warn the police if the laser is powerful enough or close enough to cause physical damage to the eyes.

This can be compared with the specifications of the device used in the attack, providing vital new evidence. "It's a little bit like matching a bullet to a gun, " said Mr Briggs.

We turn in the sky and circle the house of the "suspect", with two observers on board to track him.

The rear observer has two large screens, one showing the image from the aircraft's camera, the other a moving map.

The camera uses thermal imaging to clearly show people and warm objects standing in gardens or on open ground. Even when the warm laser pointer is thrown into a bush it can often be seen from the air.

The rear observer can zoom in to show a glowing image of an offender, and then look at the moving map, where a cursor shows the spot on which the camera is focused.

The "offender" outline appears full screen and we watch as he tries to throw the pointer away. A dog team is called in and an arrest made.

Guided by the eye in the sky, the ground officers easily find the laser. The suspect may try to claim it hasn't been used, but it is still warm, and the police have the evidence of its wavelength from the Laser Event Recorder.

Not toys

Thermal image of people with a laswer
Thermal imaging helps catch the culprits

Police currently have to prove a suspect recklessly or negligently endangered an aircraft. The Civil Aviation Authority is drawing up new laws of the air under which it will simply be an offence to shine a laser at an aircraft.

Many offenders regard what they've done as a prank, but a jail term for a first offence is now common.

Bob Jones, Head of Flight Operations at the CAA, said: "To those individuals targeting aircraft with laser devices the message is clear - don't. You will be caught and you will be prosecuted and you could spend up to five years in prison. These things are not toys, they pose a serious risk to all flight safety."

And the police insist they won't be turning a "blind eye" when they're attacked from the ground.

UK mobile operators told to share

By Jane Wakefield
Technology reporter, BBC News website

Lord Stephen Carter

The government may intervene in a dispute between UK mobile operators over the way spectrum is allocated.

At stake is the government's pledge to provide universal broadband to all areas of Britain.

The dispute hinges on the use of the 900MHz section of the airwaves, which the government has earmarked to provide wireless broadband in rural areas.

The government wants it to be shared among operators but owners Vodafone and O2 are not so keen.

The spectrum was divvied up between the two operators when they were the only players on the mobile scene.

Now rival mobile operators want a chunk of the spectrum, largely because it would provide a boost to their data services.

This is because it has better in-building coverage than the spectrum allocated for existing 3G.

"3G delivers a great service but it would be even better if it was running at the 900MHz frequency," said Forrester analyst Ian Fogg.

Use of the UK radio spectrum

Lord Carter, minister for communications and author of the Digital Britain report, has also earmarked the spectrum as a way of delivering on his promise to provide universal broadband at a minimum speed of 2Mbps (megabits per second) across the UK.

UK regulator Ofcom has proposed that a small chunk of the spectrum be handed over to one other operator.

It has warned that a solution may be imposed if the mobile operators cannot hammer out an agreement by the end of April.

All five UK mobile operators were brought together for talks in February but so far no agreement has been reached.

Broadband ambitions

In response to Lord Carter's Digital Britain report, Orange has offered to set up a network to do it.

But, in return, it wants a share of the spectrum owned by Vodafone and O2.

Steve Blythe, head of spectrum strategy at Orange, explained how the firm views the issue.

"This has been a long standing problem. Unlike other European countries, where there has been some level of redistribution of spectrum, the UK government hasn't yet taken the opportunity to do that," he said.

"900Mhz is key for our mobile broadband ambitions and to ensure a level playing field. If it isn't released O2 and Vodafone will have considerable cost advantages," it told the BBC News website.

The 800Mhz band of spectrum, which is similar in nature to the 900MHz band, will be released as the switchover to digital TV frees up spectrum currently used by analogue services.

But, said Mr Blythe, it won't realistically be available until mid-2013.

"We think it will be a useful complement but it will not replace 900MHz in the short term and without that we cannot deliver on the Digital Britain agenda," he said.

Vodafone has remained tight-lipped on the issue. It has provided no public response to the Digital Britain report and a spokeswoman told the BBC News website: "While we are actively participating in discussions, we have made it clear that these remain behind closed doors."

Image problem

Andrew Ferguson, editor of broadband news site ThinkBroadband, wondered whether mobile is even the best technology for delivering universal broadband.

"Mobile has its own problem. Like ADSL, coverage is better the closer you are to the base station, which means they are going to have to put up quite a few new towers," he said.

There could also be issues with things such as the quality of images on websites.

"Mobile broadband passes images through a compression technology. It works but you might not necessarily feel that you are getting your money's worth," he said.

Finally he said there could also be performance issues.

"I live in London where all the operators say they have coverage and I can't always get it to work. It is not as reliable as my original ADSL connection that I had in 2000," he said.

The government has not yet confirmed that mobile will fill the gaps left by fixed line broadband.

But it appears to favour the idea, said Mr Ferguson.

"It seems almost as if the decision is made," he said.

Spam overwhelms e-mail messages

By Darren Waters
Technology editor, BBC News website

Generic spam message

More than 97% of all e-mails sent over the net are unwanted, according to a Microsoft security report.

The e-mails are dominated by spam adverts for drugs, and general product pitches and often have malicious attachments.

The report found that the global ratio of infected machines was 8.6 for every 1,000 uninfected machines.

It also found that Office document attachments and PDF files were increasingly being targeted by hackers.

Microsoft said people should not panic about the high levels of unwanted e-mail.

Cliff Evans, head of security and privacy for Microsoft in the UK, told BBC News: "The good news is that the majority of that never hits your inbox although some will get through."

Ed Gibson, chief cyber security advisor at Microsoft, said the rise in spam was due to traditional organised crime figures moving away from exploiting software vulnerabilities and "targeting the weak link that is you and me".

"With higher capacity broadband and better OS (operating systems), and higher power computers it is easier now to send out billions of spams. Three or four years ago the capacity wasn't there."

Malware ecosystem

Paul Wood, senior analyst at e-mail security firm Message Labs, said he was surprised the Microsoft figure for unwanted e-mail was so high.

"Our own analysis shows that around 81% of e-mail traffic we were processing was identified as spam and unwanted," he said.

MessageLabs said spam rates had fallen at the end of 2008 as an ISP which had been hijacked to send out spam mails to users had been taken offline.

"As a result of that, a number of developers in botnet technology at the end of last year were trying to regain botnet control and increase capacity and return to previous spam levels.

"It wont be far off before we see return to those levels."

The report, which looked at online activity during the second half of 2008, also pinpoints the countries that are suffering from the most infections of malicious software, or malware.

Russia and Brazil top the global chart of infections, followed by Turkey and Serbia and Montenegro.

It said that the type of malware varied from country to country.

"As the malware ecosystem becomes more reliant on social engineering, threats worldwide have become more dependent on language and cultural factors," it reported.

In China, several malicious web browser modifiers are common, while in Brazil, malware that targets users of online banks is more widespread.

In Korea, viruses such as Win32/Virut and Win32/Parite are common.

Global average

The global average for infected machines is 8.6 for every 1,000 uninfected PCs.

The UK's infection rate is 5.7, according to the Microsoft report.

The report highlighted the need to keep operating systems, web browsers and applications up to date with the latest versions.

Increasingly, hackers are using common file formats, such as Microsoft Office documents and Adobe's PDF format as the carrier of malicious exploits or programs.

More than 91% of attacks exploiting vulnerabilities in Microsoft Office were using security holes that had been plugged by updates that had been available for more than two years.

Attacks using PDF files rose sharply in the second half of 2008, the report noted.

The vulnerabilities all of the attacks exploited had already been fixed by Adobe, and were not present in the most recent versions of the software.

Mr Gibson told BBC News people had to be aware that if they did not update their applications, such as Office and Adobe, they were not just putting themselves at risk, but others on the internet also.

"If you don't update your software you are not just a hazard to yourself, you are hazard to others because you can be part of a botnet [if your computer is hijacked]."

Mr Evans said Microsoft was very happy with the approach consumers were taking to updating applications via automatic updates.

"For consumers it is happening but for business less so. We have encourage businesses to make more use of automatic updates."

Scareware

Mr Woods said malicious hackers were exploiting Office document attachments and PDF files in order to make more targeted attacks.

"They tend to be used in selective attacks to named individuals in organisations.

"A lot of social engineering will be used to appear legitimate and convince a user to open the attachment

"Once opened, a vulnerability in the application used to open the document will be exploited and often a tiny piece of code will execute and then download a larger file from a rogue website.

"This program will then attempt to search the computer for a particular document or file and sent it to a remote PC."

The report also highlighted the rise in the use of so-called scareware, fake security programs which falsely tell people they need to install software which does nothing other than attempt to steal personal details from a users' PC.

"It's criminals playing on people's fears," said Mr Evans.

"The advice remains the same - ensuring you have up to date software, whether that's your applications, your browser or your OS."

Graphic showing infection rates around the globe

วันพฤหัสบดีที่ 2 เมษายน พ.ศ. 2552

Virus battery could 'power cars'

Professor Belcher holds up the battery

Viruses have been used to help build batteries that may one day power cars and all types of electronic devices.

The speed and relatively cheap cost of manufacturing virus batteries could prove attractive to industry.

Professor Angela Belcher, who led the research team, said: "Our material is powerful enough to be able to be used in a car battery."

The team from MIT in the US is now working on higher power batteries.

Scientists at MIT used the viruses to build both the positively and negatively charged ends of a battery, the cathode and anode, the journal Science reports.

A battery typically has four key components - the anode and cathode, an electrolyte that flows between them and a separator to keep the anode and cathode apart.

Essentially, a battery turns chemical energy into electrochemical energy when an electron flow passes from the negative end to the positive end through a conductive chemical, the electrolyte.

Researchers constructed a lithium-ion battery, similar to those used in millions of devices, but one which uses genetically engineered viruses to create the negatively charged anode and positively charged cathode.

Virus battery

The virus is a so-called common bacteriophage which infects bacteria and is harmless to humans.

Three years ago the MIT scientists manipulated genes inside a virus that coaxed the particles to grow and self-assemble to form a nanowire anode one-tenth the width of a human hair.

The microbes are encouraged to collect exotic materials - cobalt oxide and gold - and because the particles are negatively charged, they can be formed into a dense, virus-loaded film which acts as an anode and "grows" on a polymer separator.

Researchers, including MIT Professor Gerbrand Ceder and Associate Professor Michael Strano, have now developed a highly powerful cathode.

The work was more difficult because the material had to be highly conductive in order to be effective and most candidate materials for cathodes are highly insulating.

Virus

The virus was coaxed into binding with iron phosphate and then carbon nanotubes to create a highly conductive material.

The batteries have the same energy capacity and power performance as rechargeable batteries used to power plug-in hybrid cars.

The prototype battery is currently the size of a coin but the scientists believe it can be scaled and be used to create flexible batteries that can take the shape of their container, which is perfect for mobile or small devices.

The scientists have also been able to create micro-batteries which could be used to power a future generation of tiny devices.

"The advantage of using genetics is that things can be made better and better," explained Professor Belcher.

"You are not stuck with a particular material; you have selection and evolution on your side because it can be genetically engineered."

The researchers are now looking for better materials to work with the viruses to create a next-generation battery, which is even higher powered.

"Scale is the issue," admitted Professor Belcher. "But we are not going to scale until we have the right material. We believe this is possible and has commercial implications otherwise we would not be researching in this area."

Currently, the virus battery can only be charged and discharged at least 100 times before it begins to lose its capacity to store a charge, but Professor Belcher said "we expect them to be able to go much longer".

The process to build the batteries uses no harmful or toxic materials and so is attractive from an environmental point of view.

Professor Belcher said: "To us, the environmental aspects are very important.

Robo-scientist's first findings

By Victoria Gill
Science reporter, BBC News

Robot scientist

Scientists have created an ideal colleague - a robot that performs hundreds of repetitive experiments.

The robot, called Adam, is the first machine to have independently "discovered new scientific knowledge".

It has already identified the role of several genes in yeast cells, and is able to plan further experiments to test its own hypotheses.

The UK-based team that built Adam at Aberystwyth University describes the breakthrough in the journal Science.

Ross King from the department of computer science at Aberystwyth University, and who led the team, told BBC News that he envisioned a future when human scientists' time would be "freed up to do more advanced experiments".

Robotic colleagues, he said, could carry out the more mundane and time-consuming tasks.

"Adam is a prototype but, in 10-20 years, I think machines like this could be commonly used in laboratories," said Professor King.

Robotic planning

Adam can carry out up to 1,000 experiments each day, and was designed to investigate the function of genes in yeast cells - it has worked out the role of 12 of these genes.

Biologists use the yeast cells to investigate biological systems because they are simple and easy to study.

"When you sequence the yeast genome - the 6,000 different genes contained in yeast - you know what all the component parts are, but you don't know what they do," explained Professor King.

The robot was able to work out the role of the genes by observing yeast cells as they grew.

It used existing information about the function of known genes to make predictions about the role an unknown gene might play in the cell's growth.

It then tested this by looking at a strain of yeast from which that gene had been removed.

"It's like a car," Professor King said. "If you remove one component from the engine, then drive the car to see how it performs, you can find out what that particular component does."

Expensive assistant

Duc Pham from the Manufacturing Engineering Centre at Cardiff University described the robot scientist as "a clever application of robotics and computer software".

But, he added, "it's more like a junior lab assistant" than a scientist. "It will be a long time before computers can replace human scientists."

Professor King agreed that the robot was in its early stages of development.

Professor Ross King explains how robots Adam and Eve work

"If you spent all of the money we've spent on Adam on employing human biologists, Adam probably wouldn't turn out to be the cost-effective option," he said.

"But that was the case with the first car. Initially, the investment in the technology wasn't as cost-effective as sticking with horses."

He also pointed out that his robotic associate is able to express scientific findings in a clearer way than humans.

"It expresses its conclusions in logic," he said. "Human language, with all its nuances, may not be the best way to communicate scientific findings."

The same team is developing another, more advanced robot scientist called Eve, which is designed to screen new drugs.

Piracy law cuts internet traffic

Fiber-optic cables

Internet traffic in Sweden fell by 33% as the country's new anti-piracy law came into effect, reports suggest.

Sweden's new policy - the Local IPRED law - allows copyright holders to force internet service providers (ISP) to reveal details of users sharing files.

According to figures released by the government statistics agency - Statistics Sweden - 8% of the entire population use peer-to-peer sharing.

Popular BitTorrent sharing site, The Pirate Bay, is also based in Sweden.

The new law, which is based on the European Union's Intellectual Property Rights Enforcement Directive (IPRED), allows copyright holders to obtain a court order forcing ISPs to provide the IP addresses identifying which computers have been sharing copyrighted material.

Figures from Netnod, a Swedish firm that measures internet traffic in and out of the country, suggest traffic fell from an average of 120Gbps to 80Gbps on the day the new law came into effect.

Traffic lite

Speaking to the BBC, Christian Engstrom, vice-chairman of the Swedish Pirate Party - said the drop in traffic was a direct result of the new law, but that it would only be a temporary fall.

"Today, there is a very drastic reduction in internet traffic. But experience from other countries suggests that while file-sharing drops on the day a law is passed, it starts climbing again.

"One of the reasons is that it takes people a few weeks to figure out how to change their security settings so that they can share files anonymously," he added.

Mr Engstrom acknowledged that the new legislation would scare a number off file-sharing, and that the odds of getting caught had increased, but said that the risks to illegal file-sharers were still quite low.

"We estimate there are two million file-sharing [computers] in Sweden, so even if they prosecuted 1,000 people to make an example of them, for an individual user it is still a very small risk."

Prolific sharer

However, for some, that risk is already a reality.

A number of book publishers in Sweden have applied to the courts, on the day the law came out, forcing an ISP to disclose the details of one file-sharer who, the publishers claim, has more than 3,000 audio books on his server.

Speaking to the BBC, Kjell Bohlund - chair of the Swedish Publishers' Association - said that until the new law was passed, they were virtually powerless to act.

"Before 1 April, the only thing we could do about illegal file sharing was to refer it to the police, who were very reluctant to take it on.

Gottfrid Svartholm Varg, partially obscured, and Peter Sunde

"Now we can go get the courts to force ISPs to disclose the user information of an IP address.

"In two weeks time, we will know exactly who owns that IP. We can then do nothing, ask him to stop, or sue him for damages. We won't do this for small offenders, this is just for the big fish," he added.

Other companies are watching the case with interest, to determine what the court deems to be sufficient proof.

One action which began before the new legislation was the prosecution of four men accused of promoting copyright infringement via the hugely popular BitTorrent sharing site, The Pirate Bay.

The Pirate Bay hosts thousands of links to so-called torrent files, which allow for movies, TV programmes and applications to be shared online.

A verdict is expected later this month.

Public perception

Mr Engstrom said the new law was "a disaster", not just for file-sharers, but for Sweden as a whole.

"Dealing with illegal file-sharing is a job for the police. It is their job to enforce the law.

"Now we have given private corporations the legal right to go after our civilians. That's not how Western democracies work," he said.

Mr Bohlund acknowledged that cracking down on illegal file-sharing was not a long-term solution.

"In a study, 80% of people thought we shouldn't go after file-sharers.

"But ask them how they feel about taking money out of the pockets of musicians, authors or artists and that number falls by a significant amount," he said.

วันอังคารที่ 17 มีนาคม พ.ศ. 2552

Apple unveils new iPhone features

By Maggie Shiels
Technology reporter, BBC News, Silicon Valley

Apple 3.0 software sign

Apple has unveiled what it calls a "major update" to the operating system that drives the iPhone and iPod Touch.

Some of the 100 new features included in the update replicate those already offered by other smart phones.

The new functions include cut, copy and paste, long demanded by iPhone users, picture messaging and an in-phone search feature, but not Flash video.

"The upgrade is a big big deal and will help persuade consumers to stay with Apple," said Gartner analyst Van Baker.

"While things like copy and paste and multi-media messaging (MMS) are things they have needed to do for a while, other features will in essence stop consumers buying other smartphones and raise the amount of money people spend on the iPhone, " he said.

Analyst Gene Munster from Piper Jaffray agreed that the upgrade was a major step forward.

"We believe Apple addressed key issues that were leading some consumers to competing devices for multimedia messaging and enterprise email."

Some of the other main features Apple highlighted for consumers include a voice memo and stereo Bluetooth.

A new search tool called Spotlight to allow users to search files and applications on the iPhone or iPod Touch.

"Profound and amazing"

Alongside the consumer upgrades Apple also unveiled its SDK (software developer kit) aimed at helping engineers write applications for the devices.

Apple admitted that the success of its App Store, where users can download from a choice of 25,000 paid-for and free applications, had exceeded their expectations.

More than 800 million downloads have been made so far, and the company said that with the help of developers they "had created something profound and amazing."

Apple subscription box

"Our goal was to make developers successful," said Scott Forstall, head of Apple's iPhone software development.

Developers will now be able to use the iPhone's mapping capability in their own applications, as well as take advantage of "push" technology to alert users of messaging or alert software.

Users can also now take advantage of enhanced peer-to-peer capabilities for games and other programmes that communicate wirelessly.

The new software will also allow developers to sell subscription-based software products, opening up the prospect of users being asked to pay for different levels of a game, to purchase additional content or to buy virtual items.

Previously, all purchases on the iPhone or iPod Touch were ring-fenced within either the App Store or Apple's mobile version of iTunes.

Industry analysts said the new move would be an important revenue-generator for Apple and developers.

"This in-app payment capability is big news and provides a way for people to pay for content again," said Mike McGuire of Gartner.

"It will be interesting to see how the print media reacts offering subscription services for magazines, newspapers and e-books.

"Game developers will cash in and I am very excited to see how music services leverage this new function," he said.

Hardware

The operating system upgrade, the third for the iPhone, will be available from the summer and free to all iPhone users.

Users who want to download the 3.0 software onto their iPod touch will have to pay a fee of $9.95 (£6.80).

two iPhones

Industry watchers are speculating that a new iPhone will also be released around the same time as the software upgrade.

"It wouldn't surprise me to see some new hardware come the summer," said Van Baker, of Gartner. He noted that Apple is facing increasing competition from other smartphones.

Gartner recently put Apple's share of the worldwide market at 10.7%, compared to Nokia at over 40% and Research in Motion, which makes the Blackberry, at under 20%

"Apple can't continue to go with a point product and expect to get the kind of revenue it needs without some new offering. A good time to do that would be when they release 3.0," said Mr Baker.

At a separate question and answer session with journalists after the upgrade was unveiled, Apple's Phil Shiller said there was "nothing to announce on that today".