Copyright ©2016 Cengage Learning. All Rights Reserved

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Emerging Trends and Technologies: Business, People,
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
MIS EMERGING TRENDS, TECHNOLOGIES, AND APPLICATIONS CHAPTER 14 GOOGLE
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 16 Integrating Wireless Technology in business.
1 MIS, Chapter 14 ©2011 Course Technology, a part of Cengage Learning EMERGING TRENDS, TECHNOLOGIES, AND APPLICATIONS CHAPTER 14 Hossein BIDGOLI MIS.
Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital cameras, portable media players,
Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital cameras, portable media players,
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Discovering Computers: Chapter 1
1 MIS, Chapter 14 ©2011 Course Technology, a part of Cengage Learning EMERGING TRENDS, TECHNOLOGIES, AND APPLICATIONS CHAPTER 14 Hossein BIDGOLI MIS.
Chapter 9 Emerging Trends and Technologies: Business, People, and Technology Tomorrow Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved SECTION 7.1 NETWORKS AND TELECOMMUNICATIONS.
New Technologies Are Surfacing Everyday. l Some will have a dramatic affect on the business environment. l Others will totally change the way you live.
EMERGING TRENDS, TECHNOLOGIES, AND APPLICATIONS CHAPTER 14 Hossein BIDGOLI MIS GOOGLE Apple strategy COKE INFO Predator Drones Khan Academy Stuxnet.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Discovering Computers Chapter 1 Discovering Computers & Microsoft Office 2010.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin BUSINESS PLUG-IN B20 Mobile Technology.
AS ICT.  A portable communication device is a pocket sized device that is carried around by an individual  They typically have a display screen with.
Basic Data Communication
MIS EMERGING TRENDS, TECHNOLOGIES, AND APPLICATIONS CHAPTER 14
For more notes and topics visit:
PPT Slides by Dr. Craig Tyran & Kraig Pencil Computer Networking – Part 2 MIS 320 Kraig Pencil Summer 2014.
Communications & Networks
Objectives Overview Discuss the evolution of the Internet
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
Introduction to Computers
Your Interactive Guide to the Digital World Discovering Computers 2012.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Introduction To Computer System
What Is a Computer? How is a computer defined?
Living in a Digital World Discovering Computers Fundamentals, 2010 Edition.
Objectives Overview Discuss the evolution of the Internet Briefly describe various broadband Internet connections Describe the purpose of an IP address.
Explain the purpose of an operating system
Objectives Overview Discuss the purpose of the components required for successful communications and identify various sending and receiving devices Differentiate.
Opportunities in M-Commerce Standards & Applications Nour El Kadri University of Ottawa.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Week 1 Review of Computer Concepts. Objectives Recognize the importance of computer literacy Define the term, computer Identify the components of a computer.
The Digital Revolution and The Global E-Marketplace Chapter 25 Matakuliah: J0474 International Marketing Tahun: 2009.
MIS 105 LECTURE 1 INTRODUCTION TO COMPUTER HARDWARE CHAPTER REFERENCE- CHP. 1.
Objectives Overview Differentiate among laptops, tablets, desktops, and servers Describe the purpose and uses of smartphones, digital cameras, portable.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Business Driven Technology Unit 4 Building Innovation Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Chapter -08 Process technology. PROCESS TECHNOLOGY In general process technologies are devices or machines that we use every day in operations. Two key.
© McGraw-Hill Companies, Inc., McGraw-Hill/Irwin Chapter 9 Emerging Trends and Technologies.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Introduction to Computers in General By: Dr. Emelda Ntinglet-Davis Oracle DBA Class.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Living in a Digital World Discovering Computers Fundamentals, 2011 Edition.
Discovering Computers 2008 Fundamentals Fourth Edition Discovering Computers 2008 Fundamentals Fourth Edition Chapter 1 Introduction to Computers.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Microsoft Visual Basic 2015 CHAPTER ONE Introduction to Visual Basic 2015 Programming.
Cloud Computing 3. TECHNOLOGY GUIDE 3: Cloud Computing 2 Copyright John Wiley & Sons Canada.
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
Discovering Computers 2009 Chapter 1 Introduction to Computers.
Discovering Computers 2009 Chapter 1 Introduction to Computers.
NETWORK AND COMMUNICATIONS
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Fundamentals of Information Systems, Sixth Edition
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Integrating Wireless Technology in business
Copyright ©2016 Cengage Learning. All Rights Reserved
Computer Hardware-Meeting the machine
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Mobile Commerce and Ubiquitous Computing
Mobile Commerce and Ubiquitous Computing
Presentation transcript:

Copyright ©2016 Cengage Learning. All Rights Reserved Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Summarize new trends in software and service distribution Describe virtual reality components and applications Discuss uses of radio frequency identification Explain quick response codes

Summarize new uses of biometrics Describe new trends in networking, including grid, utility, and cloud computing Discuss uses of nanotechnology

Trends in Software and Service Distribution Pull technology User states a need before getting information Entering a URL in a Web browser to go to a certain website Push technology (Webcasting) Web server delivers information to users who have signed up for this service Supported by many Web browsers Delivers content to users automatically at set intervals or when a new event occurs

Trends in Software and Service Distribution Streamlines the process of users getting software updates and updated content Benefits vendors by keeping in constant touch with users creating customer loyalty Examples Microsoft direct push (AT&T) Apple push notification Blackberry

Trends in Software and Service Distribution Application service providers (ASPs) Provides access to software or services for a fee Software as a service (SaaS) Delivers software to users for a fee For temporary or long-term use Offers the recent version of the software Allows users to save all application data on the asp’s server for the software and data to be portable Known as on-demand software

Trends in Software and Service Distribution Forms of SaaS model Software services for general use Specific service Service in a vertical market

Advantages of ASPs IS personnel time is freed up to focus on applications that are important to the firm Software development costs are spread over several customers Software is kept up to date, based on users’ requests ASP contract guarantees a certain level of technical support Organization’s software costs can be reduced to a predictable monthly fee

Disadvantages of ASPs Users must accept applications as provided by ASPs Risk of applications not fully meeting the organization’s needs Integration with the customer’s other applications and systems might be challenging

Virtual Reality (VR) Uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment Simulation: Giving objects in a VR environment texture and shading for a 3D appearance Interaction: Enabling users to act on objects in a VR environment Immersion: Giving users the feeling of being part of an environment by using special hardware and software

Virtual Reality (VR) Telepresence: Giving users the sense that they are in another location and can manipulate objects as though in reality Full-body immersion: Allowing users to move around freely by combining interactive environments with cameras, monitors, and other devices Networked communication: Allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds

Types of Virtual Environments Egocentric environment User is totally immersed in the VR world Technologies used with the environment Head-mounted display (HMD) Virtual retinal display (VRD) Exocentric environment User is given a window view Data is rendered in 3D, but users can only view it on screen Users can not interact with objects, as in an egocentric environment

14.1 Egocentric VR technologies

Components of a Virtual Reality System Allows users to see and hear the virtual world Visual and aural systems Allows the user to navigate in the VR environment and control various objects Manual control for navigation Generates and manipulates high quality graphics in real time, needs a very fast processor Central coordinating processor and software system Input device captures and records movements of the user’s feet as the user walks or turns in different directions Walker

14.2 VR Components

Cave Automatic Virtual Environment (CAVE) Consists of a cube-shaped room in which the walls are rear-projection screens Holographic devices that create, capture, and display images in true 3-D form Used for research in archaeology, architecture, engineering, geology, and physics Used by engineering companies to improve product design and development

14.3 Example of a Cave

Virtual Reality Applications Military flight simulations Medicine for bloodless surgery Entertainment industry in games and theaters Current business applications Assistance for the disabled Architectural design Education Flight simulation Videoconferencing and group support systems

Obstacles in Using VR Systems Lack of fiber-optic cables to carry the data transmissions needed for a VR environment capable of re-creating a conference Confusion between the VR environment and the real environment Mobility and other problems with HMDs Difficulty representing sound Need for additional computing power

Simulated environment designed for users to interact via avatars Virtual Worlds Simulated environment designed for users to interact via avatars Avatar: 2D or 3D graphical representation of a person in the virtual world Used for gaming, social networking, and entertainment Used by organizations to conduct a variety of business activities Marketing and sales, product development, recruiting, and team meetings

Widely Used Virtual Worlds Active Worlds Club Penguin EGO Entropia Universe Habbo Runescape Second Life

Radio Frequency Identification (RFID) Tag Small electronic device consisting of a small chip and an antenna Provides a unique identification for the card or the object carrying the tag Types Passive: Include no internal power supply, can be very small Active: Include an internal power source and are more reliable than passive tags Embedded in a sticker or under the skin

Radio Frequency Identification (RFID) Tag Technical problems Signals from multiple readers can overlap Signals can be jammed or disrupted Difficult to remove Privacy and security issues Ability to read a tag’s contents after an item has left the store Tags being read without customer’s knowledge Tags with unique serial numbers being linked to credit card numbers

RFID Applications Category Examples Tracking and identification Railway cars and shipping containers, livestock and pets, supply-chain management Payment and stored-value systems Electronic toll systems, contactless credit cards, subway and bus passes Access control Building access cards, ski-lift passes, car ignition systems Anticounterfeiting Casino tokens, high-denomination currency notes, luxury goods, prescription drugs Health care Tracking medical tools and patients, monitoring patient data

Quick Response Code Matrix barcode, black modules arranged in a square pattern on a white background Features High storage capacity Small printout size Dirt and dust resistance Readable from any direction Compatible with the Japanese character set

Used in e-commerce and banking by phone Biometrics Offer a high degree of accuracy that is not possible with other security measures Used in e-commerce and banking by phone Using voice synthesizers and customers’ voices as the biometric element that identifies them remotely

Current and Future Applications of Biometrics ATM, credit, and debit cards Network and computer login security Web page security Voting Employee time clocks Member identification in sport clubs Airport security and fast check-in Passports and highly secured government ID cards Sporting events Cell phones and smart cards

Wireless Fidelity (Wi-fi) Information can be transmitted over short distances in the form of radio waves Connects computers, mobile phones and smart phones, MP3 players, PDAs, and game consoles to the internet Connections are easy to set up and have fast data transfer rates Offers mobility and flexibility

Wireless Fidelity (Wi-fi) Disadvantages Susceptible to interference from other devices and to being intercepted which raises security concerns Lack of support for high-quality media streaming

Worldwide Interoperability for Microwave Access (WiMAX) Broadband wireless technology based on the IEEE 802.16 standards Designed for wireless metropolitan area networks Includes a range of about 30 miles for fixed stations; 3-10 miles for mobile stations Fast and easy to install Enables devices using same frequency to communicate

Worldwide Interoperability for Microwave Access (WiMAX) Disadvantages Interference from other wireless devices High costs Interruptions from weather conditions Requires a lot of power Transmission speed decreases when bandwidth is shared among users

Bluetooth Wireless technology for transferring data over short distances for fixed and mobile devices Used to create a personal area network (PAN) Uses a radio technology called Frequency Hopping Spread Spectrum (FHSS)

Bluetooth Used to connect devices such as computers, GPSs, mobile phones, laptops, printers, and digital cameras Has no line-of-sight limitations Susceptible to interception

Involves combining the processing powers of various computers Grid Computing Involves combining the processing powers of various computers Allows users to make use of other computers’ resources to solve problems with this configuration involving: Large-scale, complex calculations Problems that a single computer is not capable of solving in a timely manner Each participant in a grid is referred to as a node

Used bioinformatics, oil and gas drilling, and financial applications Grid Computing Processing on overused nodes can be switched to idle servers and even desktop systems Used bioinformatics, oil and gas drilling, and financial applications Advantages Improved reliability Parallel processing nature Scalability

Utility (On-Demand) Computing Provision of IT services on demand Users pay for computing or storage resources on an as-needed basis Advantages Convenience Cost savings Drawbacks Privacy Security

Incorporates many recent technologies under one platform Cloud Computing Incorporates many recent technologies under one platform SaaS model, web 2.0, grid computing, and utility computing Includes components in the form of: Infrastructure as a service (IaaS) Platform as a service (PaaS) Software as a service (SaaS)

Cloud Computing Includes many of the advantages and disadvantages of distributed computing Users can request services, applications, and storage Services require a fee although some are free

Public, Private, Hybrid, and Community Clouds: Which One to Choose Organizations choose based on security needs and level of involvement IT managers require Public Users connect with an off-site infrastructure over the internet Private Services and the infrastructure are run on a private network

Public, Private, Hybrid, and Community Clouds: Which One to Choose Chosen by organizations that operate on both private and public data Collection of at least one private and at least one public cloud Community Cloud infrastructure is designed for exclusive use by a specific community of users from organizations with common concerns

Cloud Computing Security Organization that uses cloud computing should: Provide end-user education Force software updates Work with the cloud computing provider to spot unusual activities

Cloud Computing Security Risks Privileged user access Regulatory compliance Data location Data segregation Recovery Investigative support Long-term viability

Plays a role in the areas of: Nanotechnology Incorporates techniques that involve the structure and composition of materials on a nanoscale Plays a role in the areas of: Energy Information and communication Heavy industry Nanomaterials: Consumer goods incorporating nanotechnology

Application service providers (ASPs) Avatar Bluetooth Cave automatic virtual environment (CAVE) Cloud computing Egocentric environment Exocentric environment Grid computing

Nanotechnology Pull technology Push technology QR (quick response) code Radio frequency identification (RFID) Software as a service (SaaS) Utility (on-demand) computing

Virtual reality (VR) Virtual world Wireless fidelity (Wi-Fi) Worldwide interoperability for microwave Access (WiMAX)

Recent trends in software and service distribution include pull technology, push technology, and application service provider VR technology has added the third dimension so users can interact with objects like never before RFID devices are more popular with the retail industry and other industries

QR codes have grown in popularity, as a marketing tool Recent trends in networking technologies include wireless technologies and grid computing, WiMAX and cloud computing Nanotechnology is currently very expensive to justify its use in many applications