Presentation is loading. Please wait.

Presentation is loading. Please wait.

McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin.

Similar presentations


Presentation on theme: "McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin."— Presentation transcript:

1 McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin

2 McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved Chapter 9 EMERGING TRENDS AND TECHNOLOGIES Business, People, and Technology Tomorrow EMERGING TRENDS AND TECHNOLOGIES Business, People, and Technology Tomorrow

3 9-3 OPENING CASE STUDY The Future: Technology Out, Pringles In Technology tomorrow will be very different than today’s Today, some people are even using a Pringles can as an antenna to break into wireless networks

4 9-4 OPENING CASE STUDY In London’s financial district, over two-thirds of the wireless networks could be broken into by using a Pringles can Pringles cans are somewhat far-fetched CAVEs, biometrics, and biochips are just around the corner

5 9-5 STUDENT LEARNING OUTCOMES 1.Describe emerging trends and technologies that will change the Internet 2.Define emerging technologies as we move toward physiological interaction with technology

6 9-6 STUDENT LEARNING OUTCOMES 3.Describe technological innovations and trends in portability and mobility 4.Describe the coming C2C explosion and the broadening of e-government

7 9-7 INTRODUCTION Technological changes will be unbelievable You need to focus on how they will change your personal and business life Don’t get caught up in only the technology itself

8 9-8 INTRODUCTION

9 9-9 THE CHANGING INTERNET The Internet is the most visible and explosive The future… –Free Internet phone calls –Push, not pull and personalization –Renting software from ASPs –Information supplier convergence

10 9-10 Free Internet Phone Calls Not quite here yet, but on the horizon Use your ISP connection and computer to make phone calls Will increase mobility Will also increase dependency on technology

11 9-11 Free Internet Phone Calls

12 9-12 Push, Not Pull Technologies and Personalization We live in a “pull” environment That is, you visit Web sites and request information, products, and services The future is a “push” environment Push technology – environment in which businesses come to you with information, services, and product offerings based on your profile

13 9-13 Push, Not Pull Technologies and Personalization This isn’t spam or mass e-mail Businesses will know so much about you that they can tailor and customize offerings Consider a GPS cell phone and a movie rental store that monitors where you are –A system will determine if there any movies you like but haven’t seen –The system will call you on your cell phone

14 9-14 Push, Not Pull Technologies and Personalization It will do so because of a personal data warehouse

15 9-15 Renting Software from ASPs Businesses already do this You may soon rent personal productivity software Maybe $.25 per session You can use your PDA to build elaborate graphs You won’t need a full-blown computer

16 9-16 Renting Software from ASPs

17 9-17 Renting Software from ASPs Privacy and reliability will be important Privacy – it’s easier to obtain your information from a Web server than from your computer Reliability – what happens if the ASP Web site goes down?

18 9-18 Information Supplier Convergence You have many information suppliers –Newspaper –Magazines –ISP –Personal Web portal These may converge, through mergers and acquisitions

19 9-19 Information Supplier Convergence Once merged, you may have one business that provides everything –Phone –Internet access –Cable TV –News service That company will be able to better filter information for you

20 9-20 PHYSIOLOGICAL INTERACTION Now, you use keyboards, mice, and the like These are physical interfaces Physiological interfaces will actually capture and use your real body characteristics –Voice –Iris scan –And the like

21 9-21 Automatic Speech Recognition Automatic speech recognition (ASR) – not only captures spoken words but also distinguishes word groupings to form sentences Becoming more a reality everyday Office XP and 2003 have ASR built in Commercial systems cost less than $100

22 9-22 ASR 3 Step Process 1.Feature analysis – captures words and converts them into phonemes (syllables) 2.Pattern classification – matches phonemes to words in an acoustic model database 3.Language processing – makes sense of what you’re saying by choosing the best words

23 9-23 Virtual Reality Virtual reality – three-dimensional computer simulation in which you actively and physically participate Uses 3 unique devices –Glove –Headset –Walker

24 9-24 Virtual Reality Devices Glove – input device; captures movement and strength of your hands and fingers Headset (head-mounted display) – I/O device; captures your head movement; screen covers your field of vision Walker – input device; captures movement of your feet as you walk or turn

25 9-25 Virtual Reality Applications Matsushita – design your own virtual kitchen Volvo – demonstrate car safety features Airlines – train pilots for adverse weather conditions Motorola – train assembly line workers Health care – train doctors in surgery on virtual cadavers

26 9-26 Cave Automatic Virtual Environments Cave automatic virtual environment (CAVE) – special 3-D virtual reality room that can display images of people and objects in other CAVEs These are holographic devices Holographic device – creates, captures, and/or displays images in 3-D form

27 9-27 Cave Automatic Virtual Environments

28 9-28 Cave Automatic Virtual Environments Visit friends and family without getting on an airplane Customer service – the agent will appear next to you when you make a call The possibilities are limitless

29 9-29 Biometrics Biometrics – the use of physiological characteristics – fingerprint, iris, voice sound, and even breath – to provide identification That’s the narrow definition Can also create custom-fitting clothes using biometrics

30 9-30 Custom Clothes with Biometrics

31 9-31 Biometric Security Best security is 3-step –What you know (password) –What you have (card of some sort) –Who you are (biometric) Today’s systems use only the first two One reason why identity theft is so high

32 9-32 Integrating Biometrics with Transaction Processing TPS – captures events of a transaction Biometric processing system – captures information about you, perhaps… –Weight loss –Pregnancy –Use of drugs –Alcohol level –Vitamin deficiencies

33 9-33 Integrating Biometrics with Transaction Processing

34 9-34 Integrating Biometrics with Transaction Processing Is this ethical? Can banks use ATMs and determine if you’ve been drinking? How will businesses of the future use biometric information? Ethically? Or otherwise?

35 9-35 Other Biometric Devices Biochip – chip that can perform physiological functions when inserted into the human body –Block pain –Help paralyzed people regain motor skills –Help partially blind people see

36 9-36 Other Biometric Devices Implant chip – microchip implanted into the human body that stores information about you and can be used for tracking (GPS) –Family of 4 in Florida already have them Facial recognition software – provides identification by evaluating facial characteristics

37 9-37 INCREASING PORTABILITY AND MOBILITY Portability – how easy it is to carry around technology Mobility – what you can do with portable technologies –Digital cash –Wearable computers –Multi-state CPUs –Holographic storage devices

38 9-38 Digital Cash Digital cash (electronic cash, e-cash) – electronic representation of cash You buy it Send it to a merchant on the Internet for payments Merchant can buy other things or convert it into real cash

39 9-39 Digital Cash

40 9-40 Challenges of Digital Cash System crash = lost money No standards Makes money laundering easy Susceptible to being stolen while traveling on the Internet

41 9-41 Wearable Computers Wearable computer – fully equipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt One leader is Xybernaut (www.xybernaut.com)www.xybernaut.com

42 9-42 Wearable Computers

43 9-43 Multi-State CPUs Right now, CPUs are binary-state (0 and 1) Multi-state CPU – works with information represented in more than just 2 states, probably 10 states with each state representing a number from 0 through 9 This will make small computers very fast

44 9-44 Holographic Storage Devices Holographic storage device – stores information on a storage medium that is composed of 3-D crystal-like objects with many sides or faces This will provide tremendous storage in a small space

45 9-45 Holographic Storage Devices

46 9-46 REBIRTH OF E-COMMERCE E-commerce was the “pie in the sky” several years ago The balloon popped in 2000 E-commerce will survive as a business principle and gain strength in two areas –C2C e-commerce –E-government

47 9-47 Explosion of C2C E-Commerce Consumer to Consumer (C2C) e- commerce – when an individual sells products and services to customers who are primarily other individuals –eBay is an e-marketplace that supports C2C e- commerce –PDAs will someday hold e-commerce Web sites –People will use digital cash for payments

48 9-48 Broadening of E-Government E-government has four primary focuses –Government to Government (G2G, intra-G2G) –Government to Business (G2B) –Government to Consumer (G2C) –International Government to Government (inter- G2G)

49 9-49 Broadening of E-Government

50 9-50 E-Government Commerce Perspectives G2G – within a single nation’s government G2B – between a government and its business partners G2C – between a government and its citizens Inter-G2G – between to two or more nations’ governments

51 9-51 U.S. Government Spending on IT in 2002

52 9-52 U.S. Government Spending on IT in 2002

53 9-53 THE MOST IMPORTANT CONSIDERATIONS This course is probably ending Your studies of IT and MIS may be as well It’s time to think about what really is important

54 9-54 THE MOST IMPORTANT CONSIDERATIONS The necessity of technology –It’s everywhere –It’s inescapable –It’s up to you how it gets used Closing the great digital divide –There are technology-challenged countries and cultures –You must take technology to those places

55 9-55 THE MOST IMPORTANT CONSIDERATIONS Technology for the betterment of society –Businesses use IT to make money and that’s okay –Technology can also be used when no money is to be made; and that’s great –Many medical applications of IT will never make any money

56 9-56 THE MOST IMPORTANT CONSIDERATIONS Exchanging privacy for convenience –You do this everyday in small ways –Be careful –Don’t give up too much privacy

57 9-57 THE MOST IMPORTANT CONSIDERATIONS Ethics, ethics, ethics –Ethics are essential –Our society cannot operate without them –Use technology wisely For financial gain But never to the detriment of other people

58 9-58 CAN YOU… 1.Describe emerging trends and technologies that will change the Internet 2.Define emerging technologies as we move toward physiological interaction with technology

59 9-59 CAN YOU… 3.Describe technological innovations and trends in portability and mobility 4.Describe the coming C2C explosion and the broadening of e-government

60 McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved CHAPTER 9 End of Chapter 9


Download ppt "McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin."

Similar presentations


Ads by Google