Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Capabilities of Computing Technology

199 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Capabilities of Computing Technology

  1. 1. Capabilities of Computing Technology [Type text] Page 1
  2. 2. Table of Contents Capabilities of Computing Technology: ......................................................................................... 3 Five Capabilities of Computing: ..................................................................................................... 3 Issues Raised by Storage Devices due to its Application in Computing Technology: ................... 6 IT Policy Decisions Triggered by Storage Devices: ....................................................................... 8 Conclusion: ..................................................................................................................................... 9 References:...................................................................................................................................... 9 2 Capabilities of Computer
  3. 3. Capabilities of Computing Technology: Computing Technology evolution and dynamism has continued to affect us in all areas of human endeavor and has given computers new abilities in today’s technologically advanced world thereby making the world aligned in the dissemination and sharing of information and data that Computers are used in all aspect of human life and in very different aspects of our daily lives from health, military to education and so on and has over the years develop various capabilities which includes but are not limited to speed, accuracy, repetitiveness, storage, diligence, multimedia handling, connectivity, versatility and so on. This development and use of computing technology has given a whole new different meaning to conventional standards and norms used in communication and socialization and have also given way to various IT policies needed to address possible and potential threats that have risen and may arise due to the advent and use of computing technology. Computers have been known over the years to processes large volume of data at very high speed and this has generally aided its general acceptance worldwide. With computer speed reaching up to 100 million operations per second, computers have been able to simplify previously bigger task, help in the reduction of manual effort needed for competing tasks and the time taken for processing data and also help in accomplishing higher number of tasks within specified time. This speed has also helped in the exchange 3 were hitherto inaccessible to the common user. 1. Five Capabilities of Computing:  Speed: Capabilities of Computer
  4. 4. of information and or data between two or more computer systems connected through an Computers have been known not to make mistakes over the years. They have constantly retained high levels of precision and accuracy which can be measured as equals to a Computers processes and give information based on input from the user. So if it has been feed correct input, the output from the computer has 100% correctness while if the input feed it is wrong, the output will also have 100% incorrectness. This gave rise to the term GIGO – “Garbage In Garbage Out”. This means the output from a computer is highly dependent on the input and if the parameters have been wrongly defined by the user, the system would accurately continue to give erroneous results whereas if it had been given the right parameters it would accurately give an precise result for the entire duration of the execution of the particular task(s) (Asaolu, 2006). Computing systems has the ability to store huge amount of data and information for current usage or future referencing. Its ability for storage is also another major factor of its global acceptance aside speed and accuracy. Technological revolution, due to easy accessibility of potable music players, digital cameras, mobile phones and so on, has responded to personal needs with the development of electronic devices that include data storage capabilities. Over the years the size of storage have continually increased and cost has decreased alongside the needs of the users and now storage of up to terabytes for the conventional 4 external or internal network.  Accuracy: 100%.  Storage Capacity: Capabilities of Computer
  5. 5. computers and portable storage devices and more for servers and super computers have Cloud computing has also allowed data to be stored and retrieved easily and conveniently on servers with big storage capability from any computer and or mobile device that have been given access to the servers which has made accessibility to and availability of information and data easily as this could be done from any location and on any computer This type of storage has clearly encouraged portability into the more predictable data management standards. (Costello, 2009). Computing system has the capability to perform high end calculation and processes data within seconds which would have been tasking if performed manually. This aided in the creation of Artificial Intelligence which is the study of how computing machines can imitate human intellect by taking self-decisions based on different courses of action. Computing machines are to be developed with the ability to think, act and carry out activities like we humans do. These capabilities have led to the creation of Deep Blue, the first computer to win the leading chess champion Garry Kasparov in 1996 and NASA Valkyrie a humanoid robot (Ackerman, 2013). Computing systems have over the years evolved into playing and recording voice and video contents which are stored as media files. Multimedia files include graphics, video, animation and sound. Multiple media types are used symphonically together in creating 5 evolved. and or devices.  Logical Operations:  Multimedia: Capabilities of Computer
  6. 6. new experiences in areas such as image processing, video processing, audio analysis, text retrieval and understanding, data mining and analysis, and data fusion. 2. Issues Raised by Storage Devices due to its Application in Computing I choose storage devices because the use of portable storage devices has become commonplace in the society. This is so because storage has become relatively cheap. Issues have arisen from the use of these storage devices which has resulted in severe outcomes to individuals, Cloud computing offers large storage space and this storage space are mostly not kept in the country where the company is operating from or in country that has little or no standard policies on the privacy and security of data thereby raising doubt about the privacy of data stored on such storage devices. How secured are sensitive data hosted in Also storage devices of old computers raises an important privacy issue as they still contain personal and sensitive information such as emails, passwords and credit card numbers, also of note is that files that have been thought deleted from system and also from the recycle bin have actually not been totally removed from the computers storage devices. The files still actually exist on the storage device but are just not visible in the directory index. These data or files can be recovered maliciously and used without a trace by merely using software that can be obtained freely on the net. 6 Technology: corporation and organizations.  Privacy: the cloud? Capabilities of Computer
  7. 7. Accessibility of data over the internet and consequent storage of such data on any storage media does not give control over ownership of such data. Storage devices are becoming smaller in size and bigger in capacity, due to this, organization’s storage devices are to be properly labelled and inventoried. For individual, corporation and organization, these portable devices are to be kept securely at all times or be stored somewhere safe. Data can be transferred from one storage device to another thereby making it difficult to exercise control on such data. Therefore organizations should ensure that the use of portable storage devices is strictly controlled by ensuring that only authorized portable storage devices can be plugged into the system. Also issues have been raised over who has control over data being stored or access via cloud computing. Issue with theft of data storage devices has also raised serious concern over control as they are very small and easily conceivable. Data stored on storage devices follow that they are as accurate as the day they were stored. This means that unless those data have been previously retrieved, edited and saved back onto the storage devices, the data stored on any storage device remain as is. Issues raised here might include how accurate data stored on the storage devices are especially if they are for personal use that the organization has no controlled over or has been stolen or lost and was later retrieved by the owner. There is no telling how accurate the information that was on the storage device is to what is on it now after retrieval. 7  Ownership:  Control:  Accuracy: Capabilities of Computer
  8. 8. How secured is our storage devices or how secured is the server or computer on which my storage device is mounted are some of the issues raised as pertain to storage. Planned and unplanned introduction of viruses, malware and so on through portable storage devices can cause harm to the corporate network. It has been established that as of today one of the big threats to organization and corporations still comes from trusted insiders. This assertion simply suggests that it is the people working inside the company who are attacking the systems whether intentionally or unintentionally. 3. IT Policy Decisions Triggered by Storage Devices: The presence of advanced computing will affect the manner in which the data and information stored on storage devices are kept safe. Great care should be taken in ensuring that Data storage devices, whether be it for cloud computing, the internet (yes the internet, most databases are stored on storage devices on the server), portable storage devices and the conventional storage devices for personal systems do not fall into the wrongs hand as this can cause serious and or substantial damage to the individual, corporation and or organizations. In this regard, the following areas of IT policies would be affected:  Disclosure of data and information on storage devices.  The use of login details may be incorporated into the policy for reducing the chances of infiltration into the computer disabling those without correct login credentials access.  Networks are to be scanned for unauthorized devices 8  Security: Capabilities of Computer
  9. 9.  Data to be stored on storage devices be encrypted  Introduction of Portable Storage Devices (PSD) policies Computers are still evolving at alarming rate and storage devices will always evolved along too as data and information been bandied about have to be kept somewhere for processing currently or at a later date. Therefore rules and policies guiding the handling and usage of these devices needs to be implemented and enforced strictly in order to avoid substantial damages. Also of note is that not implementing these policies can cause harm to the professional, social and business ethics of an individual and or organization. 1. Ackerman, E. (2013) NASA JSC Unveils Valkyrie DRC Robot [online]. Available from: http://spectrum.ieee.org/automaton/robotics/military-robots/nasa-jsc-unveils-valkyrie-drc- robot (Accessed: 09 February 2014). 2. Asaolu, O.S. (2006) 'On the Emergence of New Computer Technologies', Educational Technology and Society, 9(1), pp.335 - 343. 3. Costello, T. (2009) Cloud Computing. [Online] Available from: http://www.computer.org/portal/web/computingnow/archive/february2009 (Accessed 14 9 Conclusion: References: January 2013) Capabilities of Computer
  10. 10. 4. McCormick, J. (2002) Take these precautions against inside security attacks [Online] Available from: http://www.techrepublic.com/article/take-these-precautions-against-inside- security-attacks/ (Accessed: 20 may 2016). 5. Nakpodia, E.D. (2010) 'An information system in Nigerian education: A study of data storage', International Journal of Library and Information Science, 2(6), August, 10 pp.102–107. Capabilities of Computer

×