By Raul Bernardino
Introduction:
Nowadays computing technology perspectives are to
help and fulfill human society needs. Either, they are from professional’s institution
of the computing or from software developers industries, they should understand
the grass root problems or issues that society that current faced, the
society’s trends of using the technologies, the organizations business
operations, and other entities needs. These all will enable industries to
develop applications and design proper technologies as an interface for helping
society.
The application system has to be effective,
efficient, reliable, given the accuracy of the measurements, and easy to use or
operate in the daily operation. It is also including the safety of the system
configurations, friendly environment system, and in line with the norms,
society cultures, and the ethicals.
Some of the computing capabilities are able to
track down human movement by using data communication over mobile phones, and
currency of uses, and it’s including an immigration data. The researchers are
tracking at list hundred thousand of people over last six months, etc.
The
storage data capability:
In the early computing technology, the capacities of
the computing data storages are from 20 Mb to 40 Mb of the IBM personal
computer (PC) hard disks and the floppy disks are from 512 Kb to 1.4 Mb. The
evolution of the technology and the demands of have the big storages to archive
data on disks become a priority to develop furthermore. Therefore, today
storage capacity becomes Giga byte, Terra bytes, and Peta bytes.
The purpose of having storage data is to enable
retrieving the data whenever it is needed, such to modify the current data, to
print for hard copy signed, to manipulate the data, to have the data for
decision making process, for the meeting purposes, for sharing data, and etc. Further
development of the data storage in globalization era is a data center and the cloud
computing. Another relevant question of the data storage as follows:
How much data to be archive? How much data are
relevant to the inclusive decision making processes? What data is relevant for
the meeting? And so on so for.
The
Memory capability:
The term "memory" is often associated with
addressable semiconductor memory, i.e. integrated circuits consisting of silicon-based transistors, used for example as primary
memory but also other purposes in computers and other digital electronic devices. There are two main types of
semiconductor memory: volatile and non-volatile. Examples of non-volatile
memory are flash
memory (sometimes used as secondary, sometimes primary computer
memory) and ROM/PROM/EPROM/EEPROM memory
(used for firmware such as boot programs). Examples of volatile memory are primary
memory (typically dynamic RAM, DRAM), and fast CPU
cache memory (typically static RAM, SRAM,
which is fast but energy-consuming and offer lower memory capacity per area
unit than DRAM).
The
speed capability:
The speed in the computing technology is an essential
part of the system configuration. The processors of the computing have to be
fastest. For instance all Integrated Circuit(IC) of processors are on the
nanosecond (10-9). This will allow processing multiple applications over
the computing system faster. For instance: to process the documents over
Microsoft word, Excels and power points. The Microsoft has template to speed up the
power design, made auto calculation on excel sheet, modified existing
documents, printing existing document for the meeting , and etc. Here the
efficient and effective, including the reliable are the measurement for the
speed. If we compare to the old function of type write, we will find difficult in
preparing the document. It will be time consuming and not effective.
The
capability of connection:
Today globalization needs lot of communication
infrastructures in order to make a link from very isolate societies or
communities or remote area to communicate with the cities and metropolitans
communities or urban areas. The internet network has made lot of contributions
to the world society or communities. The connectivity’s has shared the valuable
information and knowledge across the countries without a limitation. People can
easily interact with the partners around the world. The digital enable people
to learn faster than the day before. People have to go to the class, people
have to travel far or across to the country to get the information, and etc.
Nowadays, it is not an issue anymore. We can have virtual classes, as on-line
study, deliver courses and meeting via videoconferencing and audio conferences
and etc.
The
access capability:
The accessibility and reliability of the information
or data over computing and networks are becoming one of the computing
capability measurements. Today’s global computing access becomes a concern to
everyone. Therefore computing access has to be managed in order to be able to
monitor and manage the performance of the computer itself. The user has to have
the accounts and give the privileges to each of them in order to minimized the
risk of data confidentiality, protect privacy, allow public share knowledge,
and etc.
The
fast calculations result capability:
This computing capability makes human been easy to
determining decision such as calculating large and complex of issue in Math in
excel. For instance: calculating population growth prediction in the statistic
models, weather-forecasting, navigating airplane, and etc.
Beside the capability of computing there is
relationship with human being activities or issues such as:
The
privacy issues:
Nowadays
the global communication such internets and social networks communication are
publically available even in very remote area that has mobile signal coverage. This
is bringing an issue of the privacy.
“The right to privacy in Internet
activity is a serious issue facing society.”
Walton T.J. (2000)
“…yet on other
occasions society questions the state of their privacy, becoming insecure and
untrusting with respect to technology.”
Robinson,
P., Vogt, H., and Wagealla,W. (2005, p.2.)
The
ownership:
It’s also very difficult today in determining the
ownership of the information or data the internet or in the social networks. It
is appear to be anonymous. However in the universities and academics are still
looking for protecting the copy rights, such as intellectual copy rights. In
other end people intend to have a PIN to secure their assets.
The
control:
In order to have full control of things that we have,
we have to start to control the connection from our own computer or electronic
device; it is including controlling the accessibility of the information or
data that we have stored into the technology media. Nowadays, the hacker and
crackers are very active in looking for the possibilities such back doors,
phishing, and etc., in order to control your machines that have attached wide
area network. Some e.g. is DNS
poisoning.
The
accuracy:
The global connectivity’s has allowed us to reach
and gets right information that we needs in matter of the second. Lot of the
internet information has not had preapproval examined from the institutions
such university or from the producers. For instance: We had several issues computer driver that we
bought. First we have to consult with the support sited from the producer in
order to get the right version of the drivers that we are looking for. We can
also ‘Google’ it, in order to get the same information; however its most
probably to direct us to other sites that may not solve the problems.
The
security:
The security topics are hot issue in today business.
The organizations that intend to protect their own information or data is busy
investigating solutions for their security requirements. It is including the
copyrights and privacies. One of the classic examples is your house. The
stranger people can’t enter you house unless you are the one open the door for
this stranger. Your door key is your “security key”. So don’t share it to the stranger
people.
The global communication and connectivity’s has
forced the organizations, companies, and other institutions, to have the
information technology policies. This policy is to ensure the security,
privacy, and operability of the computing technology in their daily business locations.
It is also including establishing the IT standards for the organization and the
most important is that the policy is in line with the business need. It is also need to have IT Master Level
Agreement and Server Level Agreement in the organization.
References:
Adams,
A.A. & McCrindle, R.J. (2008) Pandora’s
box: Social and professional
issues
of the information age. West Sussex, England: John Wiley &
Sons, Ltd.
Hall, P. A.V. &
Fernandez-Ramil, J. (2007) Managing the Software Enterprise:
Software
Engineering and Information Systems in Context. London: Thomson
Learning.
Maths Fast Calculation Software
Freeware,
[Online]. Available from:
Robinson,P. Vogt,H.
and Wagealla,W., (2005), Privacy,
Security and
Trust within the Context of Pervasive Computing, Springer Science + Business Media, Inc. , [Online].
Available from: http://books.google.com.sg/books?id=ya6tY8Mz9OYC&pg=PA23&dq=privacy+in+the+computing&hl=en&ei=HlotTeyoKYaycMav4PAH&sa=X&oi=book_result&ct=result&resnum=3&ved=0CDQQ6AEwAg#v=onepage&q&f=true
(Accessed: 16 July 2014)
Stensland, D. and Humanitech(d:d): Merging Humanity with Technology,
[Online].
Available from: http://www.cc.gatech.edu/features/merging-humanity-with-technology
(Accessed: 16 July 2016)
Technology
On Way To Forecasting Humanity's Needs, [Online]. Available from:
http://www.sciencedaily.com/releases/2009/07/090723142048.htm
(Accessed: 16 July 2014)
Walton,T.J.,
(2000), Internet Privacy Law,
[Online]. Available from:
http://www.netatty.com/privacy/privacy.html#invade (Accessed:
16 July 2014)
Wikis (A.N.) Computer Memory, [Online].
Available from:
No comments:
Post a Comment