Download presentation
Presentation is loading. Please wait.
Published bySibyl Curtis Modified over 9 years ago
1
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin
2
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved Chapter 9 EMERGING TRENDS AND TECHNOLOGIES Business, People, and Technology Tomorrow EMERGING TRENDS AND TECHNOLOGIES Business, People, and Technology Tomorrow
3
9-3 OPENING CASE STUDY The Future: Technology Out, Pringles In Technology tomorrow will be very different than today’s Today, some people are even using a Pringles can as an antenna to break into wireless networks
4
9-4 OPENING CASE STUDY In London’s financial district, over two-thirds of the wireless networks could be broken into by using a Pringles can Pringles cans are somewhat far-fetched CAVEs, biometrics, and biochips are just around the corner
5
9-5 STUDENT LEARNING OUTCOMES 1.Describe emerging trends and technologies that will change the Internet 2.Define emerging technologies as we move toward physiological interaction with technology
6
9-6 STUDENT LEARNING OUTCOMES 3.Describe technological innovations and trends in portability and mobility 4.Describe the coming C2C explosion and the broadening of e-government
7
9-7 INTRODUCTION Technological changes will be unbelievable You need to focus on how they will change your personal and business life Don’t get caught up in only the technology itself
8
9-8 INTRODUCTION
9
9-9 THE CHANGING INTERNET The Internet is the most visible and explosive The future… –Free Internet phone calls –Push, not pull and personalization –Renting software from ASPs –Information supplier convergence
10
9-10 Free Internet Phone Calls Not quite here yet, but on the horizon Use your ISP connection and computer to make phone calls Will increase mobility Will also increase dependency on technology
11
9-11 Free Internet Phone Calls
12
9-12 Push, Not Pull Technologies and Personalization We live in a “pull” environment That is, you visit Web sites and request information, products, and services The future is a “push” environment Push technology – environment in which businesses come to you with information, services, and product offerings based on your profile
13
9-13 Push, Not Pull Technologies and Personalization This isn’t spam or mass e-mail Businesses will know so much about you that they can tailor and customize offerings Consider a GPS cell phone and a movie rental store that monitors where you are –A system will determine if there any movies you like but haven’t seen –The system will call you on your cell phone
14
9-14 Push, Not Pull Technologies and Personalization It will do so because of a personal data warehouse
15
9-15 Renting Software from ASPs Businesses already do this You may soon rent personal productivity software Maybe $.25 per session You can use your PDA to build elaborate graphs You won’t need a full-blown computer
16
9-16 Renting Software from ASPs
17
9-17 Renting Software from ASPs Privacy and reliability will be important Privacy – it’s easier to obtain your information from a Web server than from your computer Reliability – what happens if the ASP Web site goes down?
18
9-18 Information Supplier Convergence You have many information suppliers –Newspaper –Magazines –ISP –Personal Web portal These may converge, through mergers and acquisitions
19
9-19 Information Supplier Convergence Once merged, you may have one business that provides everything –Phone –Internet access –Cable TV –News service That company will be able to better filter information for you
20
9-20 PHYSIOLOGICAL INTERACTION Now, you use keyboards, mice, and the like These are physical interfaces Physiological interfaces will actually capture and use your real body characteristics –Voice –Iris scan –And the like
21
9-21 Automatic Speech Recognition Automatic speech recognition (ASR) – not only captures spoken words but also distinguishes word groupings to form sentences Becoming more a reality everyday Office XP and 2003 have ASR built in Commercial systems cost less than $100
22
9-22 ASR 3 Step Process 1.Feature analysis – captures words and converts them into phonemes (syllables) 2.Pattern classification – matches phonemes to words in an acoustic model database 3.Language processing – makes sense of what you’re saying by choosing the best words
23
9-23 Virtual Reality Virtual reality – three-dimensional computer simulation in which you actively and physically participate Uses 3 unique devices –Glove –Headset –Walker
24
9-24 Virtual Reality Devices Glove – input device; captures movement and strength of your hands and fingers Headset (head-mounted display) – I/O device; captures your head movement; screen covers your field of vision Walker – input device; captures movement of your feet as you walk or turn
25
9-25 Virtual Reality Applications Matsushita – design your own virtual kitchen Volvo – demonstrate car safety features Airlines – train pilots for adverse weather conditions Motorola – train assembly line workers Health care – train doctors in surgery on virtual cadavers
26
9-26 Cave Automatic Virtual Environments Cave automatic virtual environment (CAVE) – special 3-D virtual reality room that can display images of people and objects in other CAVEs These are holographic devices Holographic device – creates, captures, and/or displays images in 3-D form
27
9-27 Cave Automatic Virtual Environments
28
9-28 Cave Automatic Virtual Environments Visit friends and family without getting on an airplane Customer service – the agent will appear next to you when you make a call The possibilities are limitless
29
9-29 Biometrics Biometrics – the use of physiological characteristics – fingerprint, iris, voice sound, and even breath – to provide identification That’s the narrow definition Can also create custom-fitting clothes using biometrics
30
9-30 Custom Clothes with Biometrics
31
9-31 Biometric Security Best security is 3-step –What you know (password) –What you have (card of some sort) –Who you are (biometric) Today’s systems use only the first two One reason why identity theft is so high
32
9-32 Integrating Biometrics with Transaction Processing TPS – captures events of a transaction Biometric processing system – captures information about you, perhaps… –Weight loss –Pregnancy –Use of drugs –Alcohol level –Vitamin deficiencies
33
9-33 Integrating Biometrics with Transaction Processing
34
9-34 Integrating Biometrics with Transaction Processing Is this ethical? Can banks use ATMs and determine if you’ve been drinking? How will businesses of the future use biometric information? Ethically? Or otherwise?
35
9-35 Other Biometric Devices Biochip – chip that can perform physiological functions when inserted into the human body –Block pain –Help paralyzed people regain motor skills –Help partially blind people see
36
9-36 Other Biometric Devices Implant chip – microchip implanted into the human body that stores information about you and can be used for tracking (GPS) –Family of 4 in Florida already have them Facial recognition software – provides identification by evaluating facial characteristics
37
9-37 INCREASING PORTABILITY AND MOBILITY Portability – how easy it is to carry around technology Mobility – what you can do with portable technologies –Digital cash –Wearable computers –Multi-state CPUs –Holographic storage devices
38
9-38 Digital Cash Digital cash (electronic cash, e-cash) – electronic representation of cash You buy it Send it to a merchant on the Internet for payments Merchant can buy other things or convert it into real cash
39
9-39 Digital Cash
40
9-40 Challenges of Digital Cash System crash = lost money No standards Makes money laundering easy Susceptible to being stolen while traveling on the Internet
41
9-41 Wearable Computers Wearable computer – fully equipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt One leader is Xybernaut (www.xybernaut.com)www.xybernaut.com
42
9-42 Wearable Computers
43
9-43 Multi-State CPUs Right now, CPUs are binary-state (0 and 1) Multi-state CPU – works with information represented in more than just 2 states, probably 10 states with each state representing a number from 0 through 9 This will make small computers very fast
44
9-44 Holographic Storage Devices Holographic storage device – stores information on a storage medium that is composed of 3-D crystal-like objects with many sides or faces This will provide tremendous storage in a small space
45
9-45 Holographic Storage Devices
46
9-46 REBIRTH OF E-COMMERCE E-commerce was the “pie in the sky” several years ago The balloon popped in 2000 E-commerce will survive as a business principle and gain strength in two areas –C2C e-commerce –E-government
47
9-47 Explosion of C2C E-Commerce Consumer to Consumer (C2C) e- commerce – when an individual sells products and services to customers who are primarily other individuals –eBay is an e-marketplace that supports C2C e- commerce –PDAs will someday hold e-commerce Web sites –People will use digital cash for payments
48
9-48 Broadening of E-Government E-government has four primary focuses –Government to Government (G2G, intra-G2G) –Government to Business (G2B) –Government to Consumer (G2C) –International Government to Government (inter- G2G)
49
9-49 Broadening of E-Government
50
9-50 E-Government Commerce Perspectives G2G – within a single nation’s government G2B – between a government and its business partners G2C – between a government and its citizens Inter-G2G – between to two or more nations’ governments
51
9-51 U.S. Government Spending on IT in 2002
52
9-52 U.S. Government Spending on IT in 2002
53
9-53 THE MOST IMPORTANT CONSIDERATIONS This course is probably ending Your studies of IT and MIS may be as well It’s time to think about what really is important
54
9-54 THE MOST IMPORTANT CONSIDERATIONS The necessity of technology –It’s everywhere –It’s inescapable –It’s up to you how it gets used Closing the great digital divide –There are technology-challenged countries and cultures –You must take technology to those places
55
9-55 THE MOST IMPORTANT CONSIDERATIONS Technology for the betterment of society –Businesses use IT to make money and that’s okay –Technology can also be used when no money is to be made; and that’s great –Many medical applications of IT will never make any money
56
9-56 THE MOST IMPORTANT CONSIDERATIONS Exchanging privacy for convenience –You do this everyday in small ways –Be careful –Don’t give up too much privacy
57
9-57 THE MOST IMPORTANT CONSIDERATIONS Ethics, ethics, ethics –Ethics are essential –Our society cannot operate without them –Use technology wisely For financial gain But never to the detriment of other people
58
9-58 CAN YOU… 1.Describe emerging trends and technologies that will change the Internet 2.Define emerging technologies as we move toward physiological interaction with technology
59
9-59 CAN YOU… 3.Describe technological innovations and trends in portability and mobility 4.Describe the coming C2C explosion and the broadening of e-government
60
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved CHAPTER 9 End of Chapter 9
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.