Wednesday, 16 July 2014

Computing Capability and Connectivity’s

By Raul Bernardino
Introduction:
Nowadays computing technology perspectives are to help and fulfill human society needs. Either, they are from professional’s institution of the computing or from software developers industries, they should understand the grass root problems or issues that society that current faced, the society’s trends of using the technologies, the organizations business operations, and other entities needs. These all will enable industries to develop applications and design proper technologies as an interface for helping society.
The application system has to be effective, efficient, reliable, given the accuracy of the measurements, and easy to use or operate in the daily operation. It is also including the safety of the system configurations, friendly environment system, and in line with the norms, society cultures, and the ethicals.
Some of the computing capabilities are able to track down human movement by using data communication over mobile phones, and currency of uses, and it’s including an immigration data. The researchers are tracking at list hundred thousand of people over last six months, etc.
The storage data capability:
In the early computing technology, the capacities of the computing data storages are from 20 Mb to 40 Mb of the IBM personal computer (PC) hard disks and the floppy disks are from 512 Kb to 1.4 Mb. The evolution of the technology and the demands of have the big storages to archive data on disks become a priority to develop furthermore. Therefore, today storage capacity becomes Giga byte, Terra bytes, and Peta bytes.
The purpose of having storage data is to enable retrieving the data whenever it is needed, such to modify the current data, to print for hard copy signed, to manipulate the data, to have the data for decision making process, for the meeting purposes, for sharing data, and etc. Further development of the data storage in globalization era is a data center and the cloud computing. Another relevant question of the data storage as follows:
How much data to be archive? How much data are relevant to the inclusive decision making processes? What data is relevant for the meeting? And so on so for.

The Memory capability:
The term "memory" is often associated with addressable semiconductor memory, i.e. integrated circuits consisting of silicon-based transistors, used for example as primary memory but also other purposes in computers and other digital electronic devices. There are two main types of semiconductor memory: volatile and non-volatile. Examples of non-volatile memory are flash memory (sometimes used as secondary, sometimes primary computer memory) and ROM/PROM/EPROM/EEPROM memory (used for firmware such as boot programs). Examples of volatile memory are primary memory (typically dynamic RAM, DRAM), and fast CPU cache memory (typically static RAM, SRAM, which is fast but energy-consuming and offer lower memory capacity per area unit than DRAM).
The speed capability:
The speed in the computing technology is an essential part of the system configuration. The processors of the computing have to be fastest. For instance all Integrated Circuit(IC) of processors are on the nanosecond (10-9). This will allow processing multiple applications over the computing system faster. For instance: to process the documents over Microsoft word, Excels and power points.  The Microsoft has template to speed up the power design, made auto calculation on excel sheet, modified existing documents, printing existing document for the meeting , and etc. Here the efficient and effective, including the reliable are the measurement for the speed. If we compare to the old function of type write, we will find difficult in preparing the document. It will be time consuming and not effective.     
The capability of connection:
Today globalization needs lot of communication infrastructures in order to make a link from very isolate societies or communities or remote area to communicate with the cities and metropolitans communities or urban areas. The internet network has made lot of contributions to the world society or communities. The connectivity’s has shared the valuable information and knowledge across the countries without a limitation. People can easily interact with the partners around the world. The digital enable people to learn faster than the day before. People have to go to the class, people have to travel far or across to the country to get the information, and etc. Nowadays, it is not an issue anymore. We can have virtual classes, as on-line study, deliver courses and meeting via videoconferencing and audio conferences and etc.    

The access capability:
The accessibility and reliability of the information or data over computing and networks are becoming one of the computing capability measurements. Today’s global computing access becomes a concern to everyone. Therefore computing access has to be managed in order to be able to monitor and manage the performance of the computer itself. The user has to have the accounts and give the privileges to each of them in order to minimized the risk of data confidentiality, protect privacy, allow public share knowledge, and etc.
The fast calculations result capability:
This computing capability makes human been easy to determining decision such as calculating large and complex of issue in Math in excel. For instance: calculating population growth prediction in the statistic models, weather-forecasting, navigating airplane, and etc.
Beside the capability of computing there is relationship with human being activities or issues such as:
The privacy issues:
Nowadays the global communication such internets and social networks communication are publically available even in very remote area that has mobile signal coverage. This is bringing an issue of the privacy.
The right to privacy in Internet activity is a serious issue facing society.” Walton T.J. (2000)
“…yet on other occasions society questions the state of their privacy, becoming insecure and untrusting with respect to technology.” Robinson, P., Vogt, H., and Wagealla,W. (2005, p.2.)

The ownership:
It’s also very difficult today in determining the ownership of the information or data the internet or in the social networks. It is appear to be anonymous. However in the universities and academics are still looking for protecting the copy rights, such as intellectual copy rights. In other end people intend to have a PIN to secure their assets.

The control:
In order to have full control of things that we have, we have to start to control the connection from our own computer or electronic device; it is including controlling the accessibility of the information or data that we have stored into the technology media. Nowadays, the hacker and crackers are very active in looking for the possibilities such back doors, phishing, and etc., in order to control your machines that have attached wide area network.  Some e.g. is DNS poisoning.

The accuracy:
The global connectivity’s has allowed us to reach and gets right information that we needs in matter of the second. Lot of the internet information has not had preapproval examined from the institutions such university or from the producers. For instance:  We had several issues computer driver that we bought. First we have to consult with the support sited from the producer in order to get the right version of the drivers that we are looking for. We can also ‘Google’ it, in order to get the same information; however its most probably to direct us to other sites that may not solve the problems.
The security:
The security topics are hot issue in today business. The organizations that intend to protect their own information or data is busy investigating solutions for their security requirements. It is including the copyrights and privacies. One of the classic examples is your house. The stranger people can’t enter you house unless you are the one open the door for this stranger. Your door key is your “security key”. So don’t share it to the stranger people.
The global communication and connectivity’s has forced the organizations, companies, and other institutions, to have the information technology policies. This policy is to ensure the security, privacy, and operability of the computing technology in their daily business locations. It is also including establishing the IT standards for the organization and the most important is that the policy is in line with the business need.  It is also need to have IT Master Level Agreement and Server Level Agreement in the organization.
 References:
Adams, A.A. & McCrindle, R.J. (2008) Pandora’s box: Social and professional
issues of the information age. West Sussex, England: John Wiley & Sons, Ltd.
Hall, P. A.V. & Fernandez-Ramil, J. (2007) Managing the Software Enterprise:
Software Engineering and Information Systems in Context. London: Thomson Learning.
Maths Fast Calculation Software Freeware, [Online]. Available from:
Robinson,P.  Vogt,H.  and Wagealla,W., (2005), Privacy, Security and
Trust within the Context of Pervasive Computing, Springer Science + Business Media, Inc. , [Online]. Available from: http://books.google.com.sg/books?id=ya6tY8Mz9OYC&pg=PA23&dq=privacy+in+the+computing&hl=en&ei=HlotTeyoKYaycMav4PAH&sa=X&oi=book_result&ct=result&resnum=3&ved=0CDQQ6AEwAg#v=onepage&q&f=true (Accessed:  16 July 2014)
Stensland, D. and Humanitech(d:d): Merging Humanity with Technology,
[Online]. Available from: http://www.cc.gatech.edu/features/merging-humanity-with-technology (Accessed:  16 July 2016)

Technology On Way To Forecasting Humanity's Needs, [Online]. Available from:

Walton,T.J., (2000), Internet Privacy Law, [Online]. Available from:
Wikis (A.N.) Computer Memory, [Online]. Available from:
          http://en.wikipedia.org/wiki/Computer_memory (Accessed:  16 July 2014)



No comments:

Post a Comment