By Raul Bernardino
Introduction:
Nowadays computing
technology perspectives are to help and fulfill human society needs. Either,
they are from professional’s institution of the computing or from software
developers industries, they should understand the grass root problems or issues
that society that current faced, the society’s trends of using the technologies,
the organizations business operations, and other entities needs. These all will
enable industries to develop applications and design proper technologies as an interface
for helping society.
The application system
has to be effective, efficient, reliable, given the accuracy of the
measurements, and easy to use or operate in the daily operation. It is also
including the safety of the system configurations, friendly environment system,
and in line with the norms, society cultures, and the ethicals.
Some of the computing capabilities
are able to track down human movement by using data communication over mobile
phones, and currency of uses, and it’s including an immigration data. The
researchers are tracking at list hundred thousand of people over last six
months, etc.
The storage data capability:
In the early computing technology, the
capacities of the computing data storages are from 20 Mb to 40 Mb of the IBM
personal computer (PC) hard disks and the floppy disks are from 512 Kb to 1.4
Mb. The evolution of the technology and the demands of have the big storages to
archive data on disks become a priority to develop furthermore. Therefore,
today storage capacity becomes Giga byte, Terra bytes, and Peta bytes.
The purpose of having storage data is to
enable retrieving the data whenever it is needed, such to modify the current
data, to print for hard copy signed, to manipulate the data, to have the data
for decision making process, for the meeting purposes, for sharing data, and
etc. Further development of the data storage in globalization era is a data
center and the cloud computing. Another relevant question of the data storage
as follows:
How much data to be archive? How much
data are relevant to the inclusive decision making processes? What data is
relevant for the meeting? And so on so for.
The Memory capability:
The term "memory" is often associated
with addressable semiconductor
memory, i.e. integrated
circuits consisting of silicon-based transistors, used for example as primary
memory but also other purposes in computers and other digital
electronic devices. There are two main types of semiconductor memory: volatile and non-volatile. Examples of non-volatile
memory are flash
memory (sometimes used as secondary, sometimes primary computer
memory) and ROM/PROM/EPROM/EEPROM memory
(used for firmware such as boot programs). Examples of volatile memory are primary
memory (typically dynamic RAM, DRAM), and fast CPU
cache memory (typically static RAM, SRAM, which is fast but energy-consuming and offer lower
memory capacity per area unit than DRAM).
The speed capability:
The speed in the computing technology
is an essential part of the system configuration. The processors of the
computing have to be fastest. For instance all Integrated Circuit(IC) of processors
are on the nanosecond (10-9). This will allow processing multiple
applications over the computing system faster. For instance: to process the
documents over Microsoft word, Excels and power points. The Microsoft has template to speed up the
power design, made auto calculation on excel sheet, modified existing
documents, printing existing document for the meeting , and etc. Here the
efficient and effective, including the reliable are the measurement for the
speed. If we compare to the old function of type write, we will find difficult
in preparing the document. It will be time consuming and not effective.
The capability of connection:
Today globalization needs lot of
communication infrastructures in order to make a link from very isolate
societies or communities or remote area to communicate with the cities and
metropolitans communities or urban areas. The internet network has made lot of
contributions to the world society or communities. The connectivity’s has
shared the valuable information and knowledge across the countries without a
limitation. People can easily interact with the partners around the world. The
digital enable people to learn faster than the day before. People have to go to
the class, people have to travel far or across to the country to get the information,
and etc. Nowadays, it is not an issue anymore. We can have virtual classes, as on-line
study, deliver courses and meeting via videoconferencing and audio conferences
and etc.
The access capability:
The accessibility and reliability of
the information or data over computing and networks are becoming one of the
computing capability measurements. Today’s global computing access becomes a
concern to everyone. Therefore computing access has to be managed in order to
be able to monitor and manage the performance of the computer itself. The user
has to have the accounts and give the privileges to each of them in order to
minimized the risk of data confidentiality, protect privacy, allow public share
knowledge, and etc.
The fast calculations result capability:
This computing capability makes human
been easy to determining decision such as calculating large and complex of issue
in Math in excel. For instance: calculating population growth prediction in the
statistic models, weather-forecasting, navigating airplane, and etc.
Beside the capability of computing
there is relationship with human being activities or issues such as:
The privacy issues:
Nowadays the global communication such internets and social
networks communication are publically available even in very remote area that
has mobile signal coverage. This is bringing an issue of the privacy.
“The right to privacy in Internet activity is a
serious issue facing society.” Walton T.J.
(2000)
“…yet on other occasions society questions the
state of their privacy, becoming insecure and untrusting with respect to
technology.” Robinson, P., Vogt,
H., and Wagealla,W. (2005, p.2.)
The ownership:
It’s also very difficult today in
determining the ownership of the information or data the internet or in the
social networks. It is appear to be anonymous. However in the universities and
academics are still looking for protecting the copy rights, such as
intellectual copy rights. In other end people intend to have a PIN to secure
their assets.
The control:
In order to have full control of
things that we have, we have to start to control the connection from our own computer
or electronic device; it is including controlling the accessibility of the
information or data that we have stored into the technology media. Nowadays,
the hacker and crackers are very active in looking for the possibilities such
back doors, phishing, and etc., in order to control your machines that have attached
wide area network. Some e.g. is DNS
poisoning.
The accuracy:
The global connectivity’s has allowed
us to reach and gets right information that we needs in matter of the second.
Lot of the internet information has not had preapproval examined from the
institutions such university or from the producers. For instance: We had several issues computer driver that we
bought. First we have to consult with the support sited from the producer in
order to get the right version of the drivers that we are looking for. We can
also ‘Google’ it, in order to get the same information; however its most
probably to direct us to other sites that may not solve the problems.
The security:
The security topics are hot issue in
today business. The organizations that intend to protect their own information
or data is busy investigating solutions for their security requirements. It is
including the copyrights and privacies. One of the classic examples is your
house. The stranger people can’t enter you house unless you are the one open
the door for this stranger. Your door key is your “security key”. So don’t share it to the stranger people.
The global communication and
connectivity’s has forced the organizations, companies, and other institutions,
to have the information technology policies. This policy is to ensure the
security, privacy, and operability of the computing technology in their daily business
locations. It is also including establishing the IT standards for the organization
and the most important is that the policy is in line with the business need. It is also need to have IT Master Level Agreement
and Server Level Agreement in the organization.
References:
Adams,
A.A. & McCrindle, R.J. (2008) Pandora’s
box: Social and professional
issues of the
information age.
West Sussex, England: John Wiley & Sons, Ltd.
Hall, P. A.V. & Fernandez-Ramil, J. (2007) Managing the Software
Enterprise:
Software Engineering and
Information Systems in Context. London: Thomson Learning.
Maths Fast Calculation Software Freeware, [Online]. Available from:
http://www.fileguru.com/apps/maths_fast_calculation_software/freeware (Accessed:
16 July 2014)
Robinson,P. Vogt,H. and Wagealla,W., (2005), Privacy, Security and
Trust within the Context of Pervasive Computing, Springer Science + Business Media, Inc. , [Online].
Available from: http://books.google.com.sg/books?id=ya6tY8Mz9OYC&pg=PA23&dq=privacy+in+the+computing&hl=en&ei=HlotTeyoKYaycMav4PAH&sa=X&oi=book_result&ct=result&resnum=3&ved=0CDQQ6AEwAg#v=onepage&q&f=true
(Accessed: 16 July 2014)
Stensland,
D. and Humanitech(d:d): Merging Humanity
with Technology,
[Online]. Available from: http://www.cc.gatech.edu/features/merging-humanity-with-technology
(Accessed: 16 July 2016)
Technology On Way
To Forecasting Humanity's Needs, [Online].
Available from:
http://www.sciencedaily.com/releases/2009/07/090723142048.htm
(Accessed: 16 July 2014)
Walton,T.J.,
(2000), Internet Privacy Law,
[Online]. Available from:
http://www.netatty.com/privacy/privacy.html#invade
(Accessed: 16 July 2014)
Wikis (A.N.) Computer Memory, [Online]. Available from:
http://en.wikipedia.org/wiki/Computer_memory
(Accessed: 16 July 2014)