MIS EMERGING TRENDS, TECHNOLOGIES, AND APPLICATIONS CHAPTER 14

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Emerging Trends and Technologies: Business, People,
Review of Chapter 2. Important concepts – The Internet is a worldwide collection of networks that links millions of businesses, government agencies, educational.
MIS EMERGING TRENDS, TECHNOLOGIES, AND APPLICATIONS CHAPTER 14 GOOGLE
IT INFRASTRUCTURE AND EMERGING TECHNOLOGIES
Amazon. Cloud computing also known as on-demand computing or utility computing. Similar to other utility providers like electric, water, and natural gas,
Chapter 1 Introduction to Computers p. 6.
1 MIS, Chapter 14 ©2011 Course Technology, a part of Cengage Learning EMERGING TRENDS, TECHNOLOGIES, AND APPLICATIONS CHAPTER 14 Hossein BIDGOLI MIS.
Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital cameras, portable media players,
Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital cameras, portable media players,
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Copyright ©2016 Cengage Learning. All Rights Reserved
Discovering Computers: Chapter 1
1 MIS, Chapter 14 ©2011 Course Technology, a part of Cengage Learning EMERGING TRENDS, TECHNOLOGIES, AND APPLICATIONS CHAPTER 14 Hossein BIDGOLI MIS.
Chapter 9 Emerging Trends and Technologies: Business, People, and Technology Tomorrow Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
EMERGING TRENDS, TECHNOLOGIES, AND APPLICATIONS CHAPTER 14 Hossein BIDGOLI MIS GOOGLE Apple strategy COKE INFO Predator Drones Khan Academy Stuxnet.
Discovering Computers Chapter 1 Discovering Computers & Microsoft Office 2010.
AS ICT.  A portable communication device is a pocket sized device that is carried around by an individual  They typically have a display screen with.
 Cloud computing is one of the more recent technologies that many businesses, individuals and other industry organizations believe to by one of the keys.
Clouds on IT horizon Faculty of Maritime Studies University of Rijeka Sanja Mohorovičić INFuture 2009, Zagreb, 5 November 2009.
Basic Data Communication
For more notes and topics visit:
PPT Slides by Dr. Craig Tyran & Kraig Pencil Computer Networking – Part 2 MIS 320 Kraig Pencil Summer 2014.
Communications & Networks
Objectives Overview Discuss the evolution of the Internet
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Networking Can you find it? Apps.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
1 CHAPTER 18 Creating a Wireless Organization. 2 Learning Outcomes Explain how a wireless device helps an organization conduct business anytime, anywhere,
Introduction to Computers
Chapter 4 Telecommunications, the Internet, Intranets, and Extranets
CHAPTER 2 Communications, Networks, the Internet, and the World Wide Web.
Infrastructure By Sneha Venkatesh. Infrastructure Physical Hardware used to interconnect computers and users. Everything that supports the flow and processing.
Lesson 2 — The Internet and the World Wide Web
2-3 note. 2 Peripheral Devices “Peripheral devices” are hardware plugged into ports or connected to a computer wirelessly. These devices can be for input,
COMMUNICATION SYSTEM (2) CT1401 LECTURE-9 : MOBILE PHONE BY : AFNAN ALAYYASH SUPERVISION : DR.OUIEM BCHIR.
Web 2.0: Concepts and Applications 6 Linking Data.
What Is a Computer? How is a computer defined?
Living in a Digital World Discovering Computers Fundamentals, 2010 Edition.
What does a Computer Do?. What is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory,
Objectives Overview Discuss the evolution of the Internet Briefly describe various broadband Internet connections Describe the purpose of an IP address.
Objectives Overview Discuss the purpose of the components required for successful communications and identify various sending and receiving devices Differentiate.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Week 1 Review of Computer Concepts. Objectives Recognize the importance of computer literacy Define the term, computer Identify the components of a computer.
45 nm transistor 45nm =.045um (microns)= 450 Angstroms.
BUSINESS DRIVEN TECHNOLOGY Chapter Eighteen Creating a Wireless Organization.
Teaching and Learning with Technology ck to edit Master title style  Allyn and Bacon 2002 Teaching and Learning with Technology k to edit Master title.
Wireless Telecommunications Networks personal area network (PAN) A wireless telecommunications network for device-to-device connections within a very short.
Enterprise Cloud Computing
Mobile Technology Last Mile Problem Solved 1. Mobile Web’s Potential Mobile Tech 2011 The Future is Now 2.
© McGraw-Hill Companies, Inc., McGraw-Hill/Irwin Chapter 9 Emerging Trends and Technologies.
Chapter 8 – Cloud Computing
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Living in a Digital World Discovering Computers Fundamentals, 2011 Edition.
Discovering Computers 2008 Fundamentals Fourth Edition Discovering Computers 2008 Fundamentals Fourth Edition Chapter 1 Introduction to Computers.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Computer Technology Semester 2 Final Exam Review.
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
Understanding Essential Computer Concepts. Objectives Investigate types of computers Examine computer systems Examine input devices Examine output devices.
Discovering Computers 2009 Chapter 1 Introduction to Computers.
Fundamentals of Information Systems, Sixth Edition
Copyright ©2016 Cengage Learning. All Rights Reserved
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Mobile Commerce and Ubiquitous Computing
Emerging technologies-
Presentation transcript:

MIS EMERGING TRENDS, TECHNOLOGIES, AND APPLICATIONS CHAPTER 14 Hossein BIDGOLI

Chapter 14 Emerging Trends, Technologies, and Applications l e a r n i n g o u t c o m e s LO1 Summarize new trends in software and service distribution. LO2 Describe virtual reality components and applications. LO3 Discuss uses of radio frequency identification. LO4 Explain quick response codes. LO5 Summarize new uses of biometrics.

l e a r n i n g o u t c o m e s (cont’d.) Chapter 14 Emerging Trends, Technologies, and Applications l e a r n i n g o u t c o m e s (cont’d.) LO6 Describe new trends in networking, including grid, utility, and cloud computing. LO7 Discuss uses of nanotechnology.

Trends in Software and Service Distribution Recent trends in software and service distribution include: Pull and push technologies Application service providers

Pull and Push Technologies Pull technology User states a need before getting information Entering a URL in a Web browser to go to a certain Web site Push technology (Webcasting) Web server delivers information to users who have signed up for this service Supported by many Web browsers Also available from vendors Delivers content to users automatically at set intervals or when a new event occurs

Pull and Push Technologies (cont’d.) Examples of push technology: “A newer version of Adobe Flash is available. Would you like to install it?” Research In Motion (RIM) offers a new BlackBerry push API Microsoft Direct Push from AT&T

Application Service Providers Application service providers (ASPs) Provides access to software or services for a fee Software as a service (SaaS), or on-demand software Model for ASPs to deliver software to users for a fee Software might be for temporary or long-term use Users don’t need to be concerned with new software versions and compatibility problems

Application Service Providers (cont’d.) Users can also save all application data on the ASP’s server Software and data are portable The SaaS model can take several forms: Software services for general use A specific service A service in a vertical market

Application Service Providers (cont’d.) Advantages: Similar to outsourcing Less expensive Delivering information more quickly Other advantages and disadvantages Vendors: Google, Microsoft, Salesforce, NetSuite, Basecamp, and Mint

Virtual Reality Virtual reality (VR): Computer-generated, 3D images to create the illusion of interaction in a real-world environment Began with military fight simulations in the 1960s In the 1990s, Japan’s Matsushita virtual kitchen Customers changed fixtures and appliances The design could be altered on a computer Virtually walked around the kitchen space First VR system designed for general public use

Virtual Reality (cont’d.) VR terms: Simulation Interaction Immersion Telepresence Full-body immersion Networked communication

Types of Virtual Environments Egocentric environment User is totally immersed in the VR world Most common technology used with this environment is a head-mounted display (HMD) Exocentric environment Data is still rendered in 3-D Users can only view it onscreen Main technology used in this environment is 3-D graphics

Exhibit 14.1 Egocentric VR Technologies

Components of a Virtual Reality System Visual and aural systems Manual control for navigation Central coordinating processor and software system Walker

Exhibit 14.2 VR Components

CAVE Cave automatic virtual environment (CAVE) Virtual environment consisting of a cube-shaped room in which the walls are rear-projection screens Uses holographic devices that create, capture, and display images in true 3-D form People can: Enter CAVEs in other locations No matter how far away they are geographically Interact with the other users

CAVE (cont’d.) High-speed digital cameras capture one user’s presence and movements Then re-create and send these images to users in other CAVEs Used for research in many fields: Archaeology, architecture, engineering, geology, and physics Some engineering companies use CAVEs to improve product design and development

Exhibit 14.3 Example of a CAVE

Virtual Reality Applications Military flight simulations Medicine for “bloodless” surgery Entertainment industry Will one day be used for user interfaces in information systems Current business applications: Assistance for the disabled Architectural design

Virtual Reality Applications (cont’d.) Education Flight simulation Videoconferencing Group support systems

Obstacles in Using VR Systems Not enough fiber-optic cables are currently available for a VR environment capable of re-creating a conference Problems must be solved: Confusion between the VR environment and the real environment Mobility and other problems with HMDs Difficulty representing sound Need for additional computing power

Virtual Worlds Simulated environment designed for users to interact via avatars Avatar 2D or 3D graphical representation of a person in the virtual world Used in chat rooms and online games Strategy Analytics predicts that 640 million people worldwide will inhabit virtual worlds By 2015

Virtual Worlds (cont’d.) With avatars, users can: Manipulate objects Experience a limited telepresence Communicate using text, graphical icons, and sound

Virtual Worlds (cont’d.) Widely used virtual worlds Active Worlds Club Penguin EGO Entropia Universe Habbo Runescape Second Life

Radio Frequency Identification: An Overview Radio frequency identification (RFID) tag Small electronic device consisting of a small chip and an antenna Provides a unique identification for the card or the object carrying the tag Do not have to be in contact with the scanner to be read Can be read from a distance of about 20 feet

Radio Frequency Identification: An Overview (cont’d.) Two types of RFID tags: Passive No internal power supply They can be very small Best ones have about 10 years of battery life Active Usually more reliable than passive tags Technical problems and issues of privacy and security

Table 14.1 RFID applications RFID Applications

Quick Response Codes QR (quick response) code: Matrix barcode, black modules arranged in a square pattern on a white background High storage capacity Small printout size Dirt and dust resistance Readable from any direction Compatible with the Japanese character set

Biometrics: A Second Look Current and future applications of biometrics: ATM, credit, and debit cards Network and computer login security Web page security Voting Employee time clocks Member identification in sport clubs Airport security and fast check-in Passports and highly secured government ID cards Sporting events Cell phones and smart cards

Trends in Networking Recent trends in networking technologies Many are already used Wireless technologies and grid computing Newer but attracting a lot of attention: WiMAX and cloud computing

Wi-Fi Wireless Fidelity (Wi-Fi) Broadband wireless technology Information can be transmitted over short distances In the form of radio waves Connect Computers, mobile phones and smart phones, MP3 players, PDAs, and game consoles Wi-Fi hotspots

WiMAX Worldwide Interoperability for Microwave Access (WiMAX) Broadband wireless technology Based on the IEEE 802.16 standards Designed for wireless metropolitan area networks Theoretically has faster data transfer rates and a longer range than Wi-Fi Disadvantages: Interference from other wireless devices, high costs, and interruptions from weather conditions

Bluetooth Wireless technology for transferring data over short distances Can be used to create a personal area network (PAN) Popular as a safer method of talking on cell phones while driving Uses a radio technology called Frequency Hopping Spread Spectrum (FHSS)

Bluetooth (cont’d.) Used to connect devices such as: Computers, global positioning systems (GPSs), mobile phones, laptops, printers, and digital cameras No line-of-sight limitations Limited transfer rate

Grid Computing Combining the processing powers of various computers “Node” Each participant in a grid Processing on overused nodes can be switched to idle servers and even desktop systems Advantages: Improved reliability Parallel processing nature Scalability

Utility (On-Demand) Computing Provision of IT services on demand Users pay for computing or storage resources on an as-needed basis Main advantages Convenience and cost savings Drawbacks Privacy and security

Cloud Computing Platform incorporating many recent technologies under one platform, including SaaS model, Web 2.0, grid computing, and utility computing Nearly all tech vendors are involved in cloud computing Example: Editing Word document on an iPhone Same advantages and disadvantages as distributed computing

Cloud Computing (cont’d.) Services typically require a fee Some are free Google Apps Includes Gmail, Google Talk, and Google Docs Provides commonly used applications accessed via a Web browser

Public, Private, Hybrid, and Community Clouds: Which One to Choose Choose based on security needs and level of involvement IT managers require Public: Users connect with an off-site infrastructure over the Internet Private: Services and the infrastructure are run on a private network Hybrid: A collection of at least one private and at least one public cloud Community: Use by a specific community of users from organizations with common concerns

Cloud Computing Security Risks Privileged user access Regulatory compliance Data location Data segregation Recovery Investigative support Long-term viability

Nanotechnology Incorporates techniques that involve the structure and composition of materials on a nanoscale Nanometer is one billionth of a meter Current technology for miniaturizing transistors and other components might reach its limit in the next decade Some consumer goods incorporating nanotechnology are already on the market Nanomaterials

Summary New trends in: Software as a service Virtual reality RFID technologies and QR codes Networking, including Wi-Fi, WiMAX, and Bluetooth Grid, utility, and cloud computing Nanotechnology