Presentation on theme: "MIS EMERGING TRENDS, TECHNOLOGIES, AND APPLICATIONS CHAPTER 14 GOOGLE"— Presentation transcript:
1 MIS EMERGING TRENDS, TECHNOLOGIES, AND APPLICATIONS CHAPTER 14 GOOGLE Hossein BIDGOLI
2 Chapter 14 Emerging Trends, Technologies, and Applications l e a r n i n g o u t c o m e sLO1 Summarize new trends in software and service distribution.LO2 Describe virtual reality components and applications.LO3 Discuss uses of radio frequency identification.LO4 Summarize new uses of biometrics.LO5 Explain new trends in networking, including wireless technologies and grid and cloud computing.
3 l e a r n i n g o u t c o m e s (cont’d.) Chapter 14 Emerging Trends, Technologies, and Applicationsl e a r n i n g o u t c o m e s (cont’d.)LO6 Discuss uses of nanotechnology.
4 Trends in Software and Service Distribution Recent trends in software and service distribution include:Pull and push technologiesApplication service providersWith pull technology, a user states a need before getting information, as when a URL is entered in a Web browser so that the user can go to a certain Web site.However, for marketing certain products and services and for providing customized information, this tech-nology isn’t adequate. People rarely request marketing information, for example. With push technology, or Webcasting, a Web server delivers information to users who have signed up for this service instead of waiting for users to request the infPush technology delivers content to users automati-cally at set intervals or when a new event occurs. For example, you often see notices such as “ A newer version of Adobe Flash is available. Would you like to install it?” In this case, the vendor ( Adobe) is pushing the up-dated product to you as soon as it’s available, which is the event triggering the push. Of course, this example assumes you have already downloaded a previous ver-sion of Adobe Flash;ormation be sent to them.
5 Pull and Push Technologies Pull technologyUser states a need before getting informationEntering a URL in a Web browser to go to a certain Web sitePush technology (Webcasting)Web server delivers information to users who have signed up for this serviceSupported by many Web browsersAlso available from vendorsDelivers content to users automatically at set intervals or when a new event occurs
6 Pull and Push Technologies (cont’d.) Examples of push technology:“A newer version of Adobe Flash is available. Would you like to install it?”Research In Motion (RIM) offers a new BlackBerry push APIMicrosoft Direct Push from AT&T
7 Application Service Providers Application service providers (ASPs)Provides access to software or services for a feeSoftware as a service (SaaS), or on-demand softwareModel for ASPs to deliver software to users for a feeSoftware might be for temporary or long-term useUsers don’t need to be concerned with new software versions and compatibility problemsA more recent business model, called application service providers ( ASPs), provides access to software or services for a fee. Software as a service ( SaaS), or on- demand software, is a model for ASPs to deliver software to users for a fee; the software might be for temporary or for long- term use. With this delivery model, users don’t need to be concerned with new software versions and compatibility problems because the ASP offers the most recent version of the software. Users can also save all application data on the ASP’s server so that the software and data are portable. This fl exibility is convenient for those who travel or work in different locations, but it can also create privacy and security issues. Saving data on the ASP’s servers instead of on users’ own workstations might leave this data more exposed to theft or corruption by attackers.
8 Application Service Providers (cont’d.) Users can also save all application data on the ASP’s serverSoftware and data are portableThe SaaS model can take several forms:Software services for general useOffering a specific serviceOffering a service in a vertical market
9 Application Service Providers (cont’d.) Advantages:Similar to outsourcingLess expensiveDelivering information more quicklyOther advantages and disadvantagesVendors:Google, NetSuite, Inc., and Salesforce.com
10 Virtual Reality Goal of virtual reality (VR): VR technology Create an environment in which users can interact and participate as they do in the real worldVR technologyUses computer-generated, three-dimensional images to create the illusion of interaction in a real- world environment
11 Virtual Reality (cont’d.) VR terms:SimulationInteractionImmersionTelepresenceFull-body immersionNetworked communicationhe goal of virtual reality ( VR) is to create an environment in which users can interact and participate as they do in the real world. VR technology uses computer- generated, three- di-mensional images to create the illusion of interaction in a real- world environment. It can be integrated with stereo sound and tactile sensations to give users the “ feel” of being im-mersed in a three- dimensional real world. In VR terminology, the everyday physical world is referred to as an “ information environment.”
12 Types of Virtual Environments Egocentric environmentUser is totally immersed in the VR worldMost common technology used with this environment is a head-mounted display (HMD)Exocentric environmentData is still rendered in 3-DUsers can only view it onscreenMain technology used in this environment is 3-D graphicsIn an egocentric environment, the user is totally immersed in the VR world. In an exocentric environment, the user is given a “ window view.” Data is still rendered in 3- D, but users can only view it on screen. They can’t interact with objects, as in an egocentric environment.As you read through the following sections, you’ll want to be familiar with these terms:• Simulation— Giving objects in a VR environment texture and shading for a 3- D appearance.• Interaction— Enabling users to act on objects in a VR environment, as by using a data glove to pick up and move objects.• Immersion— Giving users the feeling of being part of an environment by using special hardware and software ( such as a CAVE, discussed later in this section). The real world surrounding the VR envi-ronment is blocked out so that users can focus their attention on the virtual environment.• Telepresence— Giving users the sense that they’re in another location ( even one geographically far away) and can manipulate objects as though they’re actually in that location. Telepresence systems use a variety of sophisticated hardware, discussed in “ Components of a Virtual Reality System.”• Full- body immersion— Allowing users to move around freely by combining interactive environments with cameras, monitors, and other devices.• Networked communication— Allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds.
14 CAVE Cave automatic virtual environment (CAVE) CAVEs Virtual environment consisting of a cube-shaped room in which the walls are rear-projection screensCAVEsHolographic devices that create, capture, and display images in true 3-D form
15 CAVE (cont’d.) People can enter CAVEs in other locations No matter how far away they are geographicallyHigh-speed digital cameras capture one user’s presence and movementsThen re-create and send these images to users in other CAVEsUsed for research in many fields:Archaeology, architecture, engineering, geology, and physics
16 Virtual Reality Applications Military flight simulationsMedicine for “bloodless” surgeryEntertainment industryWill one day be used for user interfaces in information systemsCurrent applications:Applications for the disabledArchitectural design
17 Virtual Reality Applications (cont’d.) EducationFlight simulationVideoconferencingGroup support systems
18 Obstacles in Using VR Systems Not enough fiber-optic cables are currently available for a VR environment capable of re- creating a conferenceProblems must be solved:Confusion between the VR environment and the real environmentMobility and other problems with HMDsSound representationAdditional computing power
19 Virtual WorldsSimulated environment designed for users to interact via avatarsAvatar2-D or 3-D graphical representation of a person in the virtual worldUsed in chat rooms and online gamesGartner Group predicts that 80% of active Internet users will interact in virtual worldsBy 2011
20 Virtual Worlds (cont’d.) With avatars, users can:Manipulate objectsExperience a limited telepresenceCommunicate using text, graphical icons, and sound
21 Radio Frequency Identification: An Overview Radio frequency identification (RFID) tagSmall electronic device consisting of a small chip and an antennaProvides a unique identification for the card or the object carrying the tagDon’t have to be in contact with the scanner to be readCan be read from a distance of about 20 feet
22 Radio Frequency Identification: An Overview (cont’d.) Two types of RFID tags:PassiveNo batteryBest ones have about 10 years of battery lifeActiveUsually more reliable than passive tagsTechnical problems and issues of privacy and security
23 Trends in Networking Recent trends in networking technologies Many are already used in many organizationsWireless technologies and grid computingNewer but attracting a lot of attention:WiMAX and cloud computing
24 WiMAX Worldwide Interoperability for Microwave Access (WiMAX) Broadband wireless technologyBased on the IEEE standardsDesigned for wireless metropolitan area networksTheoretically has faster data transfer rates and a longer range than Wi-FiDisadvantages:Interference from other wireless devices, high costs, and interruptions from weather conditionsWireless Fidelity (Wi-Fi)Broadband wireless technologyBased on the a, b, g, and n standardsInformation can be transmitted over short distancesIn the form of radio wavesConnect via:Computers, mobile phones and smart phones, MP3 players, PDAs, and game consolesWi-Fi hotspots
25 Grid ComputingConnecting different computers to combine their processing power to solve a particular problem“Node”Each participant in a gridProcessing on overused nodes can be switched to idle servers and even desktop systemsAdvantages:Improved reliabilityParallel processing natureScalability
26 Utility (On-Demand) Computing Similar to the SaaS modelProvides IT services on demandUsers pay for computing or storage resources on an as-needed basisMain advantagesConvenience and cost savingsDrawbacksPrivacy and security
27 Cloud ComputingPlatform incorporating many recent technologies under one platform, includingSaaS model, Web 2.0, grid computing, and utility computingVariety of resources can be provided to users over the InternetExample:Editing Word document on an iPhoneSame advantages and disadvantages as distributed computing
28 Cloud Computing (cont’d.) Services typically require a feeSome are freeGoogle AppsIncludes Gmail, Google Talk, and Google Docs,Provides commonly used applications accessed via a Web browserAmazon.comEstablished a computing platform that companies can use, regardless of their locationProvides storage and processing power on demand,Companies pay only for the resources they useGoogle AppsIntroduced in February 2007Competing with Microsoft’s Office Suite
29 NanotechnologyIncorporates techniques that involve the structure and composition of materials on a nanoscaleNanometer is one billionth of a meter (10-9)Current technology for making transistors and other components might reach their miniaturization limits in the next decadeSome consumer goods incorporating nanotechnology are already on the marketNanomaterials
30 Summary New trends: Software as a service Virtual reality RFID NetworkingGrid, utility, and cloud computingNanotechnology