SlideShare a Scribd company logo
Back to Table of Contents
pp. 282-297
Chapter 18
Technology Advancements
in the Workplace
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 2 of 45
The Role of Information
Technology
Information technology (IT) is
hardware and software for creating,
processing, storing, and
communicating information.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 3 of 45
Telecommuting
Telecommuting is a work
arrangement that allows employees to
work away from the workplace.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 4 of 45
Telecommuting
The advantages of telecommuting are:
• Less commute time
• Flexible hours
• Improved quality of work
• Fewer sick days
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 5 of 45
Telecommuting
The disadvantages of telecommuting
are:
• Lack of contact with other workers
• Feeling of isolation
• Distractions of home life
• Lack of supervision
• Cost of buying new equipment
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 6 of 45
Wearable Computers
Wearable computers are small,
lightweight computers that workers
carry with them.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 7 of 45
Technology in Manufacturing
Computer-aided design (CAD) is
software for designing products with a
computer.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 8 of 45
Technology in Manufacturing
When CAD and computer-aided
manufacturing (CAM) programs are
used together, companies can custom
design and produce products.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 9 of 45
Technology in Manufacturing
Manufacturing plants now are partly or
wholly automated.
Robots and computer controlled
machine tools can do hard jobs that
were done in the past by people.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 10 of 45
Expert Systems
An expert system is computer
software that stores and uses
knowledge that a human expert would
have on the same subject.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 11 of 45
Electronic Information Transfer
Electronic information transfer gives
businesses information quickly and
easily.
Many companies electronically
transfer paychecks to employees’ bank
accounts.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 12 of 45
Virtual Training
Virtual training allows learners to
simulate a real situation through a
computer.
The user views events from inside a
head-mounted display. Inside the
helmet, two miniature screens imitate
the human eye.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 13 of 45
Virtual Training
A data glove is the input device. It
relays the movements of the user’s
hand to the computer.
The information is processed and sent
to the headset. As a result, the user
can “reach into” a three-dimensional
scene.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 14 of 45
Fast Review
1. Define information technology.
2. List the pros and cons of
telecommuting.
continued
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 15 of 45
Fast Review
3. How might CAD improve a
manufacturing plant?
4. The ATM is an example of what type
of technological change?
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 16 of 45
The Internet
The Internet is a collection of tens of
thousands of connected computer
networks.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 17 of 45
The Internet
The Internet was made user friendly
by the creation of the World Wide Web
(or the Web).
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 18 of 45
Other Types of Links
An intranet allows a company to
connect employees with Internet-like
technology, but is closed to public
access.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 19 of 45
Other Types of Links
An extranet is a semiprivate network
that allows more than one company to
access the same information.
It allows different companies to share
information and to collaborate.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 20 of 45
Managing the Threats
Hackers are people who break into
computer systems for illegal purposes.
They vandalize Web sites, hard drives,
and government files.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 21 of 45
Privacy Issues
Cookies are pieces of information
about a computer user, which are
stored on your hard drive and
accessed by a server when the user
connects to a Web site.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 22 of 45
Virus
A computer virus is a program that
infects computer files by copying itself
into those files.
Every user needs antivirus software to
protect his/her computer.
Chapter 18
Introduction to Business, Technology Advancements in the Workplace Slide 23 of 45
Firewall
A firewall is a software program that
acts as a security wall between your
computer and the Internet.

More Related Content

What's hot

Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017
Matthew Bailey
 
Integrated Analytics for IIoT Predictive Maintenance using IoT Big Data Cloud...
Integrated Analytics for IIoT Predictive Maintenance using IoT Big Data Cloud...Integrated Analytics for IIoT Predictive Maintenance using IoT Big Data Cloud...
Integrated Analytics for IIoT Predictive Maintenance using IoT Big Data Cloud...
Hong-Linh Truong
 
Exploring Automation in Government
Exploring Automation in GovernmentExploring Automation in Government
Exploring Automation in Government
camunda services GmbH
 
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing TrendsIndustry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
Suyati Technologies
 
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
Enerco Energy Solutions LLP
 
Is IIOT Right for You?
Is IIOT Right for You?Is IIOT Right for You?
Is IIOT Right for You?
InSource Solutions
 
What is a smart factory
What is a smart factoryWhat is a smart factory
What is a smart factory
paul young cpa, cga
 
eBook-IoTPractice
eBook-IoTPracticeeBook-IoTPractice
eBook-IoTPractice
Shargeel sohaib
 
Industry 4.0 Overview
Industry 4.0 OverviewIndustry 4.0 Overview
Industry 4.0 Overview
Catalyst Investors
 
IoT vs IIoT vs Industry 4.0
IoT vs IIoT vs Industry 4.0IoT vs IIoT vs Industry 4.0
IoT vs IIoT vs Industry 4.0
SMACAR Solutions
 
IIoT : Old Wine in a New Bottle?
IIoT : Old Wine in a New Bottle?IIoT : Old Wine in a New Bottle?
IIoT : Old Wine in a New Bottle?
Venu Vasudevan
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
Ahmed Banafa
 
Industry week webinar on IIot and data visualzation
    Industry week webinar on IIot and data visualzation    Industry week webinar on IIot and data visualzation
Industry week webinar on IIot and data visualzation
W. David Stephenson
 
Industry 4.0 and India
Industry 4.0 and IndiaIndustry 4.0 and India
Industry 4.0 and India
Kshitij Thosar
 
Industrial IoT is coming
Industrial IoT is comingIndustrial IoT is coming
Industrial IoT is coming
Colin Koh (許国仁)
 
IIoT and JD Edwards
IIoT and JD EdwardsIIoT and JD Edwards
IIoT and JD Edwards
Chris Misztur
 
Industrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewIndustrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M Overview
Bryan Kester
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
GlobalSign
 
Case Study Intel IoT Gateway
Case Study Intel IoT GatewayCase Study Intel IoT Gateway
Case Study Intel IoT Gateway
John Koot
 
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
Vijay Pullannagari
 

What's hot (20)

Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017
 
Integrated Analytics for IIoT Predictive Maintenance using IoT Big Data Cloud...
Integrated Analytics for IIoT Predictive Maintenance using IoT Big Data Cloud...Integrated Analytics for IIoT Predictive Maintenance using IoT Big Data Cloud...
Integrated Analytics for IIoT Predictive Maintenance using IoT Big Data Cloud...
 
Exploring Automation in Government
Exploring Automation in GovernmentExploring Automation in Government
Exploring Automation in Government
 
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing TrendsIndustry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
 
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
 
Is IIOT Right for You?
Is IIOT Right for You?Is IIOT Right for You?
Is IIOT Right for You?
 
What is a smart factory
What is a smart factoryWhat is a smart factory
What is a smart factory
 
eBook-IoTPractice
eBook-IoTPracticeeBook-IoTPractice
eBook-IoTPractice
 
Industry 4.0 Overview
Industry 4.0 OverviewIndustry 4.0 Overview
Industry 4.0 Overview
 
IoT vs IIoT vs Industry 4.0
IoT vs IIoT vs Industry 4.0IoT vs IIoT vs Industry 4.0
IoT vs IIoT vs Industry 4.0
 
IIoT : Old Wine in a New Bottle?
IIoT : Old Wine in a New Bottle?IIoT : Old Wine in a New Bottle?
IIoT : Old Wine in a New Bottle?
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
 
Industry week webinar on IIot and data visualzation
    Industry week webinar on IIot and data visualzation    Industry week webinar on IIot and data visualzation
Industry week webinar on IIot and data visualzation
 
Industry 4.0 and India
Industry 4.0 and IndiaIndustry 4.0 and India
Industry 4.0 and India
 
Industrial IoT is coming
Industrial IoT is comingIndustrial IoT is coming
Industrial IoT is coming
 
IIoT and JD Edwards
IIoT and JD EdwardsIIoT and JD Edwards
IIoT and JD Edwards
 
Industrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewIndustrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M Overview
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
 
Case Study Intel IoT Gateway
Case Study Intel IoT GatewayCase Study Intel IoT Gateway
Case Study Intel IoT Gateway
 
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
 

Similar to Ch 18

Industrial Internet of Things: Recipe for Innovating the  Businesses through...
Industrial Internet of Things: Recipe for Innovating the  Businesses  through...Industrial Internet of Things: Recipe for Innovating the  Businesses  through...
Industrial Internet of Things: Recipe for Innovating the  Businesses through...
Eurotech
 
Technology Impact on Business
Technology Impact on BusinessTechnology Impact on Business
Technology Impact on Business
Amit Sarkar
 
Finaki 2015
Finaki 2015Finaki 2015
Finaki 2015
Roberto Siagri
 
Control techniques chpt 19
Control techniques chpt 19Control techniques chpt 19
Control techniques chpt 19
Chandan58
 
Citizen Developer with IIoT Driving Change.pptx
Citizen Developer with IIoT Driving Change.pptxCitizen Developer with IIoT Driving Change.pptx
Citizen Developer with IIoT Driving Change.pptx
BillBosler1
 
How enterprise can benefit from internet of things
How enterprise can benefit from internet of thingsHow enterprise can benefit from internet of things
How enterprise can benefit from internet of things
Softweb Solutions
 
Chapter 9 technology_impact_on_business
Chapter 9 technology_impact_on_businessChapter 9 technology_impact_on_business
Chapter 9 technology_impact_on_business
Jonah Howard
 
Enhancing productivity: ICT that supports digital proficiency in the communit...
Enhancing productivity: ICT that supports digital proficiency in the communit...Enhancing productivity: ICT that supports digital proficiency in the communit...
Enhancing productivity: ICT that supports digital proficiency in the communit...
Connecting Up
 
Special Report Albertas Ict Powerhouse
Special Report Albertas Ict PowerhouseSpecial Report Albertas Ict Powerhouse
Special Report Albertas Ict Powerhouse
Troy Media
 
Industry 4.0 and applications
Industry 4.0 and applicationsIndustry 4.0 and applications
Industry 4.0 and applications
Umang Tuladhar
 
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
VINTlabs | The Sogeti Trendlab
 
Sogeti things - the fourth industrial revolution - things to tighten the li...
Sogeti   things - the fourth industrial revolution - things to tighten the li...Sogeti   things - the fourth industrial revolution - things to tighten the li...
Sogeti things - the fourth industrial revolution - things to tighten the li...
polenumerique33
 
Report 3 the fourth industrial revolution - things to tighten the link betwe...
Report 3  the fourth industrial revolution - things to tighten the link betwe...Report 3  the fourth industrial revolution - things to tighten the link betwe...
Report 3 the fourth industrial revolution - things to tighten the link betwe...
Rick Bouter
 
Mc nurlin 03
Mc nurlin 03Mc nurlin 03
Mc nurlin 03
mt_magnum
 
2015 Intel IT Annual Performance Report-FINAL
2015 Intel IT Annual Performance Report-FINAL2015 Intel IT Annual Performance Report-FINAL
2015 Intel IT Annual Performance Report-FINAL
Mario A Villalta
 
Teollinen internet: mistä liiketoimintahyötyä? - Heikki Ailisto
Teollinen internet: mistä liiketoimintahyötyä? - Heikki AilistoTeollinen internet: mistä liiketoimintahyötyä? - Heikki Ailisto
Teollinen internet: mistä liiketoimintahyötyä? - Heikki Ailisto
VTT Technical Research Centre of Finland Ltd
 
E-Commerce 07
E-Commerce 07E-Commerce 07
E-Commerce 07
Zarrar Siddiqui
 
Darwin - PT IMI
Darwin - PT IMIDarwin - PT IMI
Darwin - PT IMI
PT Datacomm Diangraha
 
INFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptxINFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptx
SushmitaSah5
 
Industry 4.0 and Cyber physical systems Intro
Industry 4.0 and Cyber physical systems IntroIndustry 4.0 and Cyber physical systems Intro
Industry 4.0 and Cyber physical systems Intro
Dr Mohamed Elfarran
 

Similar to Ch 18 (20)

Industrial Internet of Things: Recipe for Innovating the  Businesses through...
Industrial Internet of Things: Recipe for Innovating the  Businesses  through...Industrial Internet of Things: Recipe for Innovating the  Businesses  through...
Industrial Internet of Things: Recipe for Innovating the  Businesses through...
 
Technology Impact on Business
Technology Impact on BusinessTechnology Impact on Business
Technology Impact on Business
 
Finaki 2015
Finaki 2015Finaki 2015
Finaki 2015
 
Control techniques chpt 19
Control techniques chpt 19Control techniques chpt 19
Control techniques chpt 19
 
Citizen Developer with IIoT Driving Change.pptx
Citizen Developer with IIoT Driving Change.pptxCitizen Developer with IIoT Driving Change.pptx
Citizen Developer with IIoT Driving Change.pptx
 
How enterprise can benefit from internet of things
How enterprise can benefit from internet of thingsHow enterprise can benefit from internet of things
How enterprise can benefit from internet of things
 
Chapter 9 technology_impact_on_business
Chapter 9 technology_impact_on_businessChapter 9 technology_impact_on_business
Chapter 9 technology_impact_on_business
 
Enhancing productivity: ICT that supports digital proficiency in the communit...
Enhancing productivity: ICT that supports digital proficiency in the communit...Enhancing productivity: ICT that supports digital proficiency in the communit...
Enhancing productivity: ICT that supports digital proficiency in the communit...
 
Special Report Albertas Ict Powerhouse
Special Report Albertas Ict PowerhouseSpecial Report Albertas Ict Powerhouse
Special Report Albertas Ict Powerhouse
 
Industry 4.0 and applications
Industry 4.0 and applicationsIndustry 4.0 and applications
Industry 4.0 and applications
 
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
 
Sogeti things - the fourth industrial revolution - things to tighten the li...
Sogeti   things - the fourth industrial revolution - things to tighten the li...Sogeti   things - the fourth industrial revolution - things to tighten the li...
Sogeti things - the fourth industrial revolution - things to tighten the li...
 
Report 3 the fourth industrial revolution - things to tighten the link betwe...
Report 3  the fourth industrial revolution - things to tighten the link betwe...Report 3  the fourth industrial revolution - things to tighten the link betwe...
Report 3 the fourth industrial revolution - things to tighten the link betwe...
 
Mc nurlin 03
Mc nurlin 03Mc nurlin 03
Mc nurlin 03
 
2015 Intel IT Annual Performance Report-FINAL
2015 Intel IT Annual Performance Report-FINAL2015 Intel IT Annual Performance Report-FINAL
2015 Intel IT Annual Performance Report-FINAL
 
Teollinen internet: mistä liiketoimintahyötyä? - Heikki Ailisto
Teollinen internet: mistä liiketoimintahyötyä? - Heikki AilistoTeollinen internet: mistä liiketoimintahyötyä? - Heikki Ailisto
Teollinen internet: mistä liiketoimintahyötyä? - Heikki Ailisto
 
E-Commerce 07
E-Commerce 07E-Commerce 07
E-Commerce 07
 
Darwin - PT IMI
Darwin - PT IMIDarwin - PT IMI
Darwin - PT IMI
 
INFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptxINFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptx
 
Industry 4.0 and Cyber physical systems Intro
Industry 4.0 and Cyber physical systems IntroIndustry 4.0 and Cyber physical systems Intro
Industry 4.0 and Cyber physical systems Intro
 

More from Nathan Bateman

Security presentation
Security presentationSecurity presentation
Security presentation
Nathan Bateman
 
Tech use plan_presentation
Tech use plan_presentationTech use plan_presentation
Tech use plan_presentation
Nathan Bateman
 
Ch 12
Ch 12Ch 12
Unit 5
Unit 5Unit 5
American bluegrass
American bluegrassAmerican bluegrass
American bluegrass
Nathan Bateman
 
Chapter 29
Chapter 29Chapter 29
Chapter 29
Nathan Bateman
 
Chapter 29
Chapter 29Chapter 29
Chapter 29
Nathan Bateman
 

More from Nathan Bateman (7)

Security presentation
Security presentationSecurity presentation
Security presentation
 
Tech use plan_presentation
Tech use plan_presentationTech use plan_presentation
Tech use plan_presentation
 
Ch 12
Ch 12Ch 12
Ch 12
 
Unit 5
Unit 5Unit 5
Unit 5
 
American bluegrass
American bluegrassAmerican bluegrass
American bluegrass
 
Chapter 29
Chapter 29Chapter 29
Chapter 29
 
Chapter 29
Chapter 29Chapter 29
Chapter 29
 

Recently uploaded

Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 

Recently uploaded (20)

Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 

Ch 18

  • 1. Back to Table of Contents pp. 282-297 Chapter 18 Technology Advancements in the Workplace
  • 2. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 2 of 45 The Role of Information Technology Information technology (IT) is hardware and software for creating, processing, storing, and communicating information.
  • 3. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 3 of 45 Telecommuting Telecommuting is a work arrangement that allows employees to work away from the workplace.
  • 4. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 4 of 45 Telecommuting The advantages of telecommuting are: • Less commute time • Flexible hours • Improved quality of work • Fewer sick days
  • 5. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 5 of 45 Telecommuting The disadvantages of telecommuting are: • Lack of contact with other workers • Feeling of isolation • Distractions of home life • Lack of supervision • Cost of buying new equipment
  • 6. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 6 of 45 Wearable Computers Wearable computers are small, lightweight computers that workers carry with them.
  • 7. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 7 of 45 Technology in Manufacturing Computer-aided design (CAD) is software for designing products with a computer.
  • 8. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 8 of 45 Technology in Manufacturing When CAD and computer-aided manufacturing (CAM) programs are used together, companies can custom design and produce products.
  • 9. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 9 of 45 Technology in Manufacturing Manufacturing plants now are partly or wholly automated. Robots and computer controlled machine tools can do hard jobs that were done in the past by people.
  • 10. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 10 of 45 Expert Systems An expert system is computer software that stores and uses knowledge that a human expert would have on the same subject.
  • 11. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 11 of 45 Electronic Information Transfer Electronic information transfer gives businesses information quickly and easily. Many companies electronically transfer paychecks to employees’ bank accounts.
  • 12. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 12 of 45 Virtual Training Virtual training allows learners to simulate a real situation through a computer. The user views events from inside a head-mounted display. Inside the helmet, two miniature screens imitate the human eye.
  • 13. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 13 of 45 Virtual Training A data glove is the input device. It relays the movements of the user’s hand to the computer. The information is processed and sent to the headset. As a result, the user can “reach into” a three-dimensional scene.
  • 14. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 14 of 45 Fast Review 1. Define information technology. 2. List the pros and cons of telecommuting. continued
  • 15. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 15 of 45 Fast Review 3. How might CAD improve a manufacturing plant? 4. The ATM is an example of what type of technological change?
  • 16. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 16 of 45 The Internet The Internet is a collection of tens of thousands of connected computer networks.
  • 17. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 17 of 45 The Internet The Internet was made user friendly by the creation of the World Wide Web (or the Web).
  • 18. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 18 of 45 Other Types of Links An intranet allows a company to connect employees with Internet-like technology, but is closed to public access.
  • 19. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 19 of 45 Other Types of Links An extranet is a semiprivate network that allows more than one company to access the same information. It allows different companies to share information and to collaborate.
  • 20. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 20 of 45 Managing the Threats Hackers are people who break into computer systems for illegal purposes. They vandalize Web sites, hard drives, and government files.
  • 21. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 21 of 45 Privacy Issues Cookies are pieces of information about a computer user, which are stored on your hard drive and accessed by a server when the user connects to a Web site.
  • 22. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 22 of 45 Virus A computer virus is a program that infects computer files by copying itself into those files. Every user needs antivirus software to protect his/her computer.
  • 23. Chapter 18 Introduction to Business, Technology Advancements in the Workplace Slide 23 of 45 Firewall A firewall is a software program that acts as a security wall between your computer and the Internet.