Submit Search
Upload
ADET.ppt
•
Download as PPT, PDF
•
0 likes
•
8 views
A
Ano Nymus
Follow
An introduction to emerging technology
Read less
Read more
Technology
Report
Share
Report
Share
1 of 40
Download now
Recommended
9781111533960_PPT_ch14.ppt
9781111533960_PPT_ch14.ppt
ssuser046cf5
9781111533960_PPT_ch14.ppt
9781111533960_PPT_ch14.ppt
AarushSharma69
9781111533960_PPT_ch14.ppt
9781111533960_PPT_ch14.ppt
MariaEmaan1
9781111533960_PPT_ch14.ppt
9781111533960_PPT_ch14.ppt
kinzafayyaz5
RECAP at ETSI Experiential Network Intelligence (ENI) Meeting
RECAP at ETSI Experiential Network Intelligence (ENI) Meeting
RECAP Project
Nx ray etisalatnigeria
Nx ray etisalatnigeria
Owoeye Opeyemi
ISCC 2013 keynote "Pervasive Sensing and IoT Cooking Recipe: Just add People ...
ISCC 2013 keynote "Pervasive Sensing and IoT Cooking Recipe: Just add People ...
Milan Milenkovic
DEVNET-1145 How APIs are Driving City Digitization
DEVNET-1145 How APIs are Driving City Digitization
Cisco DevNet
Recommended
9781111533960_PPT_ch14.ppt
9781111533960_PPT_ch14.ppt
ssuser046cf5
9781111533960_PPT_ch14.ppt
9781111533960_PPT_ch14.ppt
AarushSharma69
9781111533960_PPT_ch14.ppt
9781111533960_PPT_ch14.ppt
MariaEmaan1
9781111533960_PPT_ch14.ppt
9781111533960_PPT_ch14.ppt
kinzafayyaz5
RECAP at ETSI Experiential Network Intelligence (ENI) Meeting
RECAP at ETSI Experiential Network Intelligence (ENI) Meeting
RECAP Project
Nx ray etisalatnigeria
Nx ray etisalatnigeria
Owoeye Opeyemi
ISCC 2013 keynote "Pervasive Sensing and IoT Cooking Recipe: Just add People ...
ISCC 2013 keynote "Pervasive Sensing and IoT Cooking Recipe: Just add People ...
Milan Milenkovic
DEVNET-1145 How APIs are Driving City Digitization
DEVNET-1145 How APIs are Driving City Digitization
Cisco DevNet
Black book converted
Black book converted
PratikSarvankar2
Black book converted
Black book converted
PratikSarvankar2
Multi-access Edge Computing (MEC), Nokia
Multi-access Edge Computing (MEC), Nokia
Small Cell Forum
nokia.pptx
nokia.pptx
tejoteh843
R-Style Lab Mobile Portfolio
R-Style Lab Mobile Portfolio
ahardziyenka
Design and Experiment Platform for Industrial Wireless Systems
Design and Experiment Platform for Industrial Wireless Systems
Ryan
Break trough effectivness for the maintenance
Break trough effectivness for the maintenance
Zo Rasatavohary
Integrating Mobile Technology in the Construction Industry
Integrating Mobile Technology in the Construction Industry
Appear
Designing Mobile Applications for All: Accessible Contact Manager
Designing Mobile Applications for All: Accessible Contact Manager
AEGIS-ACCESSIBLE Projects
Meetup 21/9/2017 - Image Recogonition: onmisbaar voor een slimme stad?
Meetup 21/9/2017 - Image Recogonition: onmisbaar voor een slimme stad?
Digipolis Antwerpen
Crafting Infrastructures
Crafting Infrastructures
Luca Galli
Harnessing Big Data_UCLA
Harnessing Big Data_UCLA
Paul Barsch
CitySituationAppSeminar
CitySituationAppSeminar
Yogitha Mahadasu
Mohammad Al-Masri Detailed Resume
Mohammad Al-Masri Detailed Resume
Mohammad Al-masri
TBSS Project - MPA SSA CFP2015 Panel Evaluation Presentation
TBSS Project - MPA SSA CFP2015 Panel Evaluation Presentation
TBSS Group
lokesh_UX_Designer_v5
lokesh_UX_Designer_v5
Lokesh S
Towards Future Internet: Web 3.0, Internet of Services & Internet of Things
Towards Future Internet: Web 3.0, Internet of Services & Internet of Things
Diego López-de-Ipiña González-de-Artaza
Fin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIs
Robert Greiner
The Management of The Future Internet With SDN and NFV
The Management of The Future Internet With SDN and NFV
AmeerAlSadi
The new E-GNSS paradigm "from technology to service provision"
The new E-GNSS paradigm "from technology to service provision"
Finmeccanica
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
More Related Content
Similar to ADET.ppt
Black book converted
Black book converted
PratikSarvankar2
Black book converted
Black book converted
PratikSarvankar2
Multi-access Edge Computing (MEC), Nokia
Multi-access Edge Computing (MEC), Nokia
Small Cell Forum
nokia.pptx
nokia.pptx
tejoteh843
R-Style Lab Mobile Portfolio
R-Style Lab Mobile Portfolio
ahardziyenka
Design and Experiment Platform for Industrial Wireless Systems
Design and Experiment Platform for Industrial Wireless Systems
Ryan
Break trough effectivness for the maintenance
Break trough effectivness for the maintenance
Zo Rasatavohary
Integrating Mobile Technology in the Construction Industry
Integrating Mobile Technology in the Construction Industry
Appear
Designing Mobile Applications for All: Accessible Contact Manager
Designing Mobile Applications for All: Accessible Contact Manager
AEGIS-ACCESSIBLE Projects
Meetup 21/9/2017 - Image Recogonition: onmisbaar voor een slimme stad?
Meetup 21/9/2017 - Image Recogonition: onmisbaar voor een slimme stad?
Digipolis Antwerpen
Crafting Infrastructures
Crafting Infrastructures
Luca Galli
Harnessing Big Data_UCLA
Harnessing Big Data_UCLA
Paul Barsch
CitySituationAppSeminar
CitySituationAppSeminar
Yogitha Mahadasu
Mohammad Al-Masri Detailed Resume
Mohammad Al-Masri Detailed Resume
Mohammad Al-masri
TBSS Project - MPA SSA CFP2015 Panel Evaluation Presentation
TBSS Project - MPA SSA CFP2015 Panel Evaluation Presentation
TBSS Group
lokesh_UX_Designer_v5
lokesh_UX_Designer_v5
Lokesh S
Towards Future Internet: Web 3.0, Internet of Services & Internet of Things
Towards Future Internet: Web 3.0, Internet of Services & Internet of Things
Diego López-de-Ipiña González-de-Artaza
Fin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIs
Robert Greiner
The Management of The Future Internet With SDN and NFV
The Management of The Future Internet With SDN and NFV
AmeerAlSadi
The new E-GNSS paradigm "from technology to service provision"
The new E-GNSS paradigm "from technology to service provision"
Finmeccanica
Similar to ADET.ppt
(20)
Black book converted
Black book converted
Black book converted
Black book converted
Multi-access Edge Computing (MEC), Nokia
Multi-access Edge Computing (MEC), Nokia
nokia.pptx
nokia.pptx
R-Style Lab Mobile Portfolio
R-Style Lab Mobile Portfolio
Design and Experiment Platform for Industrial Wireless Systems
Design and Experiment Platform for Industrial Wireless Systems
Break trough effectivness for the maintenance
Break trough effectivness for the maintenance
Integrating Mobile Technology in the Construction Industry
Integrating Mobile Technology in the Construction Industry
Designing Mobile Applications for All: Accessible Contact Manager
Designing Mobile Applications for All: Accessible Contact Manager
Meetup 21/9/2017 - Image Recogonition: onmisbaar voor een slimme stad?
Meetup 21/9/2017 - Image Recogonition: onmisbaar voor een slimme stad?
Crafting Infrastructures
Crafting Infrastructures
Harnessing Big Data_UCLA
Harnessing Big Data_UCLA
CitySituationAppSeminar
CitySituationAppSeminar
Mohammad Al-Masri Detailed Resume
Mohammad Al-Masri Detailed Resume
TBSS Project - MPA SSA CFP2015 Panel Evaluation Presentation
TBSS Project - MPA SSA CFP2015 Panel Evaluation Presentation
lokesh_UX_Designer_v5
lokesh_UX_Designer_v5
Towards Future Internet: Web 3.0, Internet of Services & Internet of Things
Towards Future Internet: Web 3.0, Internet of Services & Internet of Things
Fin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIs
The Management of The Future Internet With SDN and NFV
The Management of The Future Internet With SDN and NFV
The new E-GNSS paradigm "from technology to service provision"
The new E-GNSS paradigm "from technology to service provision"
Recently uploaded
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Stunning ➥8448380779▻ Call Girls In Hauz Khas Delhi NCR
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
BookNet Canada
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
Precisely
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Deakin University
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
null - The Open Security Community
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Recently uploaded
(20)
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
ADET.ppt
1.
1 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning EMERGING TRENDS, TECHNOLOGIES, AND APPLICATIONS CHAPTER 14
2.
2 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Trends in Software and Service Distribution • Recent trends in software and service distribution include: – Pull and push technologies – Application service providers
3.
3 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Pull and Push Technologies • Pull technology – User states a need before getting information – Entering a URL in a Web browser to go to a certain Web site • Push technology (Webcasting) – Web server delivers information to users who have signed up for this service – Supported by many Web browsers – Also available from vendors – Delivers content to users automatically at set intervals or when a new event occurs
4.
4 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Pull and Push Technologies (cont’d.) • Examples of push technology: – “A newer version of Adobe Flash is available. Would you like to install it?” – Research In Motion (RIM) offers a new BlackBerry push API – Microsoft Direct Push from AT&T
5.
5 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Application Service Providers • Application service providers (ASPs) – Provide access to software or services for a fee • Software as a service (SaaS), or on- demand software – Model for ASPs to deliver software to users for a fee – Software might be for temporary or long-term use – Users don’t need to be concerned with new software versions and compatibility problems
6.
6 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Application Service Providers (cont’d.) • Users can also save all application data on the ASP’s server – Software and data are portable • The SaaS model can take several forms: – Software services for general use – Offering a specific service – Offering a service in a vertical market
7.
7 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Application Service Providers (cont’d.) • Advantages: – Similar to outsourcing • Less expensive • Delivering information more quickly • Other advantages and disadvantages • Vendors: – Google, NetSuite, Inc., and Salesforce.com
8.
8 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Virtual Reality • Goal of virtual reality (VR): – Create an environment in which users can interact and participate as they do in the real world • VR technology – Uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment
9.
9 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Virtual Reality (cont’d.) • VR terms: – Simulation – Interaction – Immersion – Telepresence – Full-body immersion – Networked communication
10.
10 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Types of Virtual Environments • Egocentric environment – User is totally immersed in the VR world – Most common technology used with this environment is a head-mounted display (HMD) • Exocentric environment – Data is still rendered in 3-D – Users can only view it onscreen – Main technology used in this environment is 3-D graphics
11.
11 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Exhibit 14.1 Egocentric VR Technologies
12.
12 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Components of a Virtual Reality System • Visual and aural systems • Manual control for navigation • Central coordinating processor and software system • Walker
13.
13 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Exhibit 14.2 VR Components
14.
14 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications CAVE • Cave automatic virtual environment (CAVE) – Virtual environment consisting of a cube-shaped room in which the walls are rear-projection screens • CAVEs – Holographic devices that create, capture, and display images in true 3-D form
15.
15 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications CAVE (cont’d.) • People can enter CAVEs in other locations – No matter how far away they are geographically • High-speed digital cameras capture one user’s presence and movements – Then re-create and send these images to users in other CAVEs • Used for research in many fields: – Archaeology, architecture, engineering, geology, and physics
16.
16 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Exhibit 14.3 An Example of a CAVE
17.
17 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Virtual Reality Applications • Military flight simulations • Medicine for “bloodless” surgery • Entertainment industry • Will one day be used for user interfaces in information systems • Current applications: – Applications for the disabled – Architectural design
18.
18 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Virtual Reality Applications (cont’d.) – Education – Flight simulation – Videoconferencing – Group support systems
19.
19 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Obstacles in Using VR Systems • Not enough fiber-optic cables are currently available for a VR environment capable of re- creating a conference • Problems must be solved: – Confusion between the VR environment and the real environment – Mobility and other problems with HMDs – Sound representation – Additional computing power
20.
20 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Virtual Worlds • Simulated environment designed for users to interact via avatars • Avatar – 2-D or 3-D graphical representation of a person in the virtual world – Used in chat rooms and online games • Gartner Group predicts that 80% of active Internet users will interact in virtual worlds by 2011
21.
21 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Virtual Worlds (cont’d.) • With avatars, users can: – Manipulate objects – Experience a limited telepresence – Communicate using text, graphical icons, and sound
22.
22 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Virtual Worlds (cont’d.) • Widely used virtual worlds: – Active Worlds – Club Penguin – EGO – Entropia Universe – Habbo – Runescape – Second Life
23.
23 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Virtual Worlds in Action • Second Life – Several million members from all over the world – Some companies use Second Life to establish or enhance their image, generate sales leads, and increase sales • Some experts believe that groups work together better in virtual worlds than in face-to-face meetings and teleconferences
24.
24 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Radio Frequency Identification: An Overview • Radio frequency identification (RFID) tag – Small electronic device consisting of a small chip and an antenna – Provides a unique identification for the card or the object carrying the tag – Don’t have to be in contact with the scanner to be read – Can be read from a distance of about 20 feet
25.
25 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Radio Frequency Identification: An Overview (cont’d.) • Two types of RFID tags: – Passive • No battery • Best ones have about 10 years of battery life – Active • Usually more reliable than passive tags • Technical problems and issues of privacy and security
26.
26 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Table 14.1 RFID Applications RFID Applications Category Examples Tracking and identification Railway cars and shipping containers, livestock and pets, supply-chain management (tracking merchandise from manufacturers to retailers to customers), inventory control, retail checkout and POS systems, recycling and waste disposal Payment and stored-value systems Electronic toll systems, contactless credit cards (require no swiping), subway and bus passes, casino tokens, concert tickets Access control Building access cards, ski-lift passes, car ignition systems Anticounterfeiting Casino tokens, high-denomination currency notes, luxury goods, prescription drugs Health care Tracking medical tools and patients (particularly newborns and patients with Alzheimer’s), process control, monitoring patient data
27.
27 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Biometrics: A Second Look • Current and future applications of biometrics: – ATM, credit, and debit cards – Network and computer login security – Web page security – Voting – Employee time clocks – Airport security and fast check-in – Passports and highly secured government ID cards – Sporting events – Cell phones and smart cards
28.
28 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Trends in Networking • Recent trends in networking technologies • Many are already used in many organizations – Wireless technologies and grid computing • Newer but attracting a lot of attention: – WiMAX and cloud computing
29.
29 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Wi-Fi • Wireless Fidelity (Wi-Fi) – Broadband wireless technology – Based on the 802.11a, 802.11b, 802.11g, and 802.11n standards • Information can be transmitted over short distances – In the form of radio waves • Connect via: – Computers, mobile phones and smart phones, MP3 players, PDAs, and game consoles – Wi-Fi hotspots
30.
30 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications WiMAX • Worldwide Interoperability for Microwave Access (WiMAX) – Broadband wireless technology – Based on the IEEE 802.16 standards • Designed for wireless metropolitan area networks • Theoretically has faster data transfer rates and a longer range than Wi-Fi • Disadvantages: – Interference from other wireless devices, high costs, and interruptions from weather conditions
31.
31 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Bluetooth • Can be used to create a personal area network (PAN) • Wireless technology for transferring data over short distances • Specifications are developed and licensed by the Bluetooth Special Interest Group • Uses a radio technology called Frequency Hopping Spread Spectrum (FHSS)
32.
32 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Bluetooth (cont’d.) • Used to connect devices such as: – Computers, global positioning systems (GPSs), mobile phones, laptops, printers, and digital cameras • No line-of-sight limitations • Limited transfer rate
33.
33 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Grid Computing • Connecting different computers to combine their processing power to solve a particular problem • “Node” – Each participant in a grid • Processing on overused nodes can be switched to idle servers and even desktop systems • Advantages: – Improved reliability – Parallel processing nature – Scalability
34.
34 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Utility (On-Demand) Computing • Similar to the SaaS model • Provides IT services on demand • Users pay for computing or storage resources on an as-needed basis • Main advantages – Convenience and cost savings • Drawbacks – Privacy and security
35.
35 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Cloud Computing • Platform incorporating many recent technologies under one platform, including: – SaaS model, Web 2.0, grid computing, and utility computing • Variety of resources can be provided to users over the Internet • Example: – Editing Word document on an iPhone • Same advantages and disadvantages as distributed computing
36.
36 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Cloud Computing (cont’d.) • Services typically require a fee • Some are free • Google Apps – Includes Gmail, Google Talk, and Google Docs, – Provides commonly used applications accessed via a Web browser
37.
37 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Table 14-2 Cloud Computing Categories and the Top Players Categories Top Players Foundations (tools and software that make it possible to build cloud infrastructure) Vmware, Microsoft, Red Hat Infrastructure Amazon, IBM Network services (the communication components that combine with cloud foundation and infrastructure to form cloud architecture) Level 3 Computing Services , Amazon, Cisco, Citrix Platforms Amazon, IBM Applications Google, Salesforce.com, Oracle, DROPBOX Security EMC/RSA, Symantec, IBM Management IBM, Amazon
38.
38 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Cloud Computing in Action • Amazon.com – Established a computing platform that companies can use, regardless of their location – Provides storage and processing power on demand – Companies pay only for the resources they use • Google Apps – Introduced in February 2007 – Competing with Microsoft’s Office Suite
39.
39 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Nanotechnology • Incorporates techniques that involve the structure and composition of materials on a nanoscale • Nanometer is one billionth of a meter (10-9) • Current technology for making transistors and other components might reach their miniaturization limits in the next decade • Some consumer goods incorporating nanotechnology are already on the market – Nanomaterials
40.
40 MIS, Chapter 14 ©2011
Course Technology, a part of Cengage Learning Chapter 14 Emerging Trends, Technologies, and Applications Summary • New trends: – Software as a service – Virtual reality – RFID – Networking – Grid, utility, and cloud computing – Nanotechnology
Download now