The Future of Social Networking in 2050 By Alex, Kim, Nicole, Jessie, and David.

Slides:



Advertisements
Similar presentations
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Emerging Trends and Technologies: Business, People,
Advertisements

3.04 Understand the use of direct marketing to attract attention and to build a brand.
Our Digital World Second Edition
Implications and Security Issues of the Internet By Neelesh Patel.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Page 1 SIXTH SENSE TECHNOLOGY Presented by: KIRTI AGGARWAL 2K7-MRCE-CS-035.
Amanda Shoults and Niki Huffman. WHAT IS IT?! The Sixth Sense technology is a “wearable gestural interface that augments the physical world around us.
RFIDs and the Future Logistic System Dr. Hayden So Department of Electrical and Electronic Engineering 17 Sep, 2008.
R.F.I.D.. What is RFID RFID: Radio Frequency Identification is about the size of a grain of sand and sends out a small radio signal. Originally designed.
Retail Article “ Tell-Tale Tags - radio frequency identification equipment usage for retail” Andrea Holcom & Andrea Boitano.
Web 2.0 Web 2.0 is the term given to describe a second generation of the World Wide Web (WWW) that is focused on the ability for people to collaborate.
Unit 24 OCR Nationals – LEVEL 3 Kick Start. Well you asked... There are no Model Assignments for any of the Units beyond the compulsories, so this is.
By: Alex Frank, Ashley Watson and Larry Rogers CSC 101.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Your Interactive Guide to the Digital World Discovering Computers 2012.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Business Driven Technology Unit 4 Building Innovation Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin BUSINESS PLUG-IN B20 Mobile Technology.
G OO GLE GLASS For more notes and topics visit: eITnotes.com.
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
1 CHAPTER 18 Creating a Wireless Organization. 2 Learning Outcomes Explain how a wireless device helps an organization conduct business anytime, anywhere,
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
Computers are Everywhere Computers and Careers. Computers in Today’s World Business Medical Field Weather Legal System Agriculture Sports Gaming.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
IT’s private. Ofcom report 80% of UK homes have access to the Internet 76% of UK homes have broadband 40% of UK adults use a smartphone Image by: VEER/Corina.
Presentation by: K.G.P.Srikanth. CONTENTS  Introduction  Components  Working  Applications.
Trends Information Systems and Management. Trends Disruptive versus Sustaining Wireless IT Focus for organizations IRM –Strategic vs. –Operational CIO.
 Facebook  Twitter  MySpace  Windows LiveSpace.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
November 10,  Acceptable use  Internet Filtering  Social Web (MySpace, Facebook, etc.)  Cyberbullying  Plagiarism  Phishing.
DATA COLLECTION METHODS CONTENT PAGE How data is collected via questionnaires. How data is collected via questionnaires. How data is collected with mark.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved BUSINESS DRIVEN TECHNOLOGY Chapter Eighteen Creating a Wireless Organization.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 7 NETWORKS, TELECOMMUNICATIONS, AND MOBILE TECHNOLOGY CHAPTER 7 NETWORKS,
Delivering Your Messages in Today’s Online Environment American Library Association, PR Forum Kevin T. Kirkpatrick Executive Vice President Sunday, July.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
BUSINESS DRIVEN TECHNOLOGY Chapter Eighteen Creating a Wireless Organization.
Helping your family to stay in control Living with technology.
Business Driven Technology Unit 4 Building Innovation Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
© McGraw-Hill Companies, Inc., McGraw-Hill/Irwin Chapter 9 Emerging Trends and Technologies.
Cyberbullying What does it mean? What can we do?.
Multi-Channel Marketing
Networks & Communications Diambil dari : Module Application Training Institut Teknologi Bandung
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Review Future Technology. Definition Biometrics refers to technologies used to detect and recognize human physical characteristics.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Radio Frequency Tags Chandler Allen. The use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Smart PWNs: An Ethical Analysis of Smart Phone Technology Colin O'Hanlon Josh Schwartz Norman Littlejohn.
Ubiquitous means ‘everywhere’
SPK – 4 Golomazov Artem in my life. Hello! My name is Artem and I’d like to tell you about Information Technology by using Information Technology! It.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Context Rich Systems Market to Global Analysis and Forecasts by Component, Device and Vertical No of Pages: 150 Publishing Date: Jan 2017 Single.
Facebook privacy policy
Creating your online identity
Name: Sayyid Ali Hussein Gaabane
Input Devices.
Topic 6: Issues Press F5 to view!
Importance of Privacy Internet Safety
yahoo mail technical support number
"You don't need anyone's permission to make something great
Mobile Commerce and Ubiquitous Computing
Radio Frequency Identification
IoTs (Internet of Things)
Presentation transcript:

The Future of Social Networking in 2050 By Alex, Kim, Nicole, Jessie, and David

Mobile Computing: The Way of the Future “Combining social and mobile-- there is a new wave if opportunities coming up, a growth of users, so mobile internet is clearly the next major computing cycle.” -- Ram Shriram, founding board member of Google Using cell phones on a mobile network is increasingly popular In the future, internet will be global and wireless. Information will be at our fingertips within seconds

Technology as a Sixth Sense Computers will be able to give us information through gestural or more organic means We will be able to get information no matter where we are Majority of information will be delivered before we even have to ask for it or send it Homogenized culture… knowing people before you even meet them, equal access to information to everyone

Technology RFID Tagging (Radio frequency Identification) RFIDs are small, easy to manufacture transponders that can be made as small as a grain of sand Companies like Abercrombie and Fitch are already starting to experiment with this technology to track inventory RFID tags could be implanted into anything, from a sweater to a box of cookies handheld smart phones interact with RFIDs Smart phones would make spontaneous networks between other nearby phones, and gather information about whatever object the transponder is tagging

Technology cont… Arduino Chips Make objects ‘smart’ Small, easy to make computing chips A man has programmed one so that his chair puts a tweet on twitter whenever it senses noxious gases Mean we are delivered information before we even have to look for it Projected Displays Wearable computer systems that turn almost any surface into interactive display screen Develops a sixth sense through technology

Implications Homogenization of culture… unity and acceptance of all walks of life Privacy issues  as information becomes more available, controlling who sees it will become more difficult ‘Online’ identities will be controlled through one online profile or account (like OpenID) If hacked, this could have disastrous consequences

Implications cont… How will we censor information? How will we control it? Identity theft will be a major concern Quantum computers will replace today's computers, having the ability to break encrypted code in seconds  today's computers would take 20 years to break same code Biometrics (finger prints, iris scan, voice recognition) will be highly used to identify individuals DNA theft= theft of the future Even pacemakers could be hacked in future

Project Concept Make a ‘fake’ website that is a news website from the year 2050 Have an article special on online hackers and how to protect identity This will be a good platform to introduce tagging, face- recognition, and other technologies of the future Information contained in articles, video (mock interviews), and possibly some interactive content as a mock guide on how to better regulate privacy settings and prevent identity theft