StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Technology - Research Paper Example

Cite this document
Summary
The paper delves on different information technology updates. Information is grounded on how information is saved, transmitted and retrieved. The paper focuses on the strengths and weaknesses of the latest technology. Lastly, the paper discusses the advantages of one chosen information technology. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Information Technology
Read Text Preview

Extract of sample "Information Technology"

February 9, Information Technology Introduction The new information technology attention focuses on enhanced data transfer. The paper delves on different information technology updates. Information is grounded on how information is saved, transmitted and retrieved. The paper focuses on the strengths and weaknesses of the latest technology. Lastly, the paper discusses the advantages of one chosen information technology. Some of the latest information technologies enhance information transfer. Cloud Computing Many people have started to trust the cloud computing information technology. With the high demand for tablets and cell phone internet service, the cloud computing is a timely new technology. There are several cloud computing sites. The increasing popularity of cloud computing is estimated to grow. One cloud computing entity, Enterprise Cloud services is expected to from 23 billion during 2011 to $67 billion in 2016 (Srinivasan, 2014). Likewise, Cisco affirms that 2016 cloud traffic will reach 67 percent during 2016 (Srinivasan, 2014). Further, several companies offer cloud computing alternatives (New IT Strategies, 2011). Sun Microsystems offers a 50 day free version using MySQL, Open Solaris and other software. IBM Company offers its own IBM DB2 cloud computing alternative. Google offers its own free 500 mg Google Drive cloud computing alternative. Microsoft has its own Azure NET based cloud computing alternative. Further, the new technology has its strengths. First, users can save their files in the cloud computing sites. Next, the technology eliminates the need for GB hard disks. Third, people can use the cloud computing sites to exchange or share relevant and valid information. Fourth, people can save on hard disk maintenance costs (Srinivasan, 2014). However, the same cloud computing program has some weaknesses. First, possible data loss may occur when the chosen cloud computing site malfunctions. Second, confidential data may be leaked by cloud computing hackers (Dhanjani, 2009). Third, Cloud computing site employees or management personnel will retrieve and/or use the uploaded cloud computing information for profit or other illegal purposes. Vodafone educational technology Vodafone came up with a new technology during 2014. The new technology aims to bridge the information technology gap between parents and their children (Bateman, 2015). With the parents falling behind in terms of information technology I.Q., Vodafone offers free information technology lessons to parents of enrolled children. Pilot studies were conducted in some selected North London and South London elementary schools during 2014. Specifically, school in London’s Wiltshire and Rugby communities were included in Vodafone’s child and parent joint information technology programs. Further, the program has its strengths. First, parents will learn to keep abreast with continually changing information technology. Second, the Vodafone program creates a stronger bond between parents and their elementary children. Third, the parent’s new information technology capability will enhance the parents’ communication-based work outputs at home and at work (Bateman, 2015). However, the same program some weaknesses. First, uninterested parents cannot be forced to learn the new technology. Some old persons prefer to stick to the old ways of doing things, making the Vodafone program a parent-based failure. Third, the more intelligent or fast learning children may be frustrated or discouraged by the parent’s slower learning capacity (Bateman, 2015). Face Identification Technology A computer program focuses on identifying the monkey species. The new computer program helps the researchers identify the monkey species. The program scans the monkeys’ faces and compares the image with the current monkey features database. The program uses the faces of the monkeys for identification purposes (Allen &Higham, 2015). Further, the program has its strengths. First, the program relieves the monkey researchers from the burden of personally identifying the monkey species. Second, the software delivers more accurate identification results compared to the busy, greenhorn, and new monkey researchers. Third, human bias in the monkey identification process is eliminated (Allen &Higham, 2015). However, the program has some weaknesses. First, the wrong database will deliver the same wrong face-based monkey identification. In places where electricity is absent, computers cannot be used to identify the monkey species. A virus-infected program may deliver the wrong monkey identification (Allen &Higham, 2015). Emotion Gathering Technology A new technology allows certain sites to determine the pictures’ emotions (Rochester University, 2015). The technology can be used to detect emotions within the Face book, Twitter, and other social networking sites. Emotions may include sad, happy, angry, in love, and other human emotions. Professor J. Lou of Rochester University collaborated with Adobe Research to craft the new emotions software. Further, there are some advantages of the program. First, the emotions bring emphasis to the message. Second, the emotions will explain the message for people who cannot read. Third, the emotions image will prod the message reader to favorably shift attention to replying to the emotion-filled messages (Rochester University, 2015). However, the program has its disadvantages. First, the software may slow down the site visitors’ viewing quality. Second, the software may interfere with the social networking site visitor’s current viewing activities, unnecessarily disturbing the site visitor. The program may deliver the wrong emotions, wrongly sending the wrong emotion message (Rochester University, 2015). Technology Choice The chosen technology is cloud computing. Of all the above technologies, cloud computing is the most important. Several methods can be implemented to integrate the technology to the grocery store entity. First, internet will be installed in the grocery. Second, registration with a chosen cloud computing site will be done. Third, a memo will be distributed requiring all employees to save all their files in the chosen cloud computing sites. Fourth, all employees are instructed to retrieve all required files from the chosen cloud computing sites (Yang, 2012). Further, cloud computing technology has its advantages. First, the fear of employees losing important grocery store data is prevented. Second, any store employee and management officer can access the grocery store’s data from the cloud computing sites. Third, line and staff employees can access the cloud computing files the cell phone, computer, tablet, or any other information technology peripheral device. Lastly, the employees and management can access the cloud computing files from New York, London, Japan, or any other location (Yang, 2012). Conclusion Accordingly, information technology spotlights the enhancement of current information transfer activities. Cloud computing allows the site visitors to securely save confidential files within the cloud computing sites. Vodafone technology enhances the parents’ digital age I.Q. Monkey Face Identification delivers more accurate monkey identification. The chosen technology, cloud computing, allows easy saving, access, and updating of the visitors’ cloud computing sites’ save information. Evidently, the latest information technologies favorably improve information transfer. References: Allen, W., Higham, J. (2015, February 3). Assessing the Potential Information Content of Multicomponent Visual Signals. Retrieved February 8, 2015, from Science Daily: < www.sciencedaily.com> Bateman, K. (2015). Vodafone aims to Bridge Pupil and Parent Digital Divide. New York: Computer Weekly Press. Dhanjani, N. (2009). Hacking: The Next Generation. New York: O Reilly Press. NewITStrategies. (2011). Top Cloud Computing Companies and Key Features. Retrieved February 8, 2015, from < http://new.itstrategists.com/top-cloud-computing-companies.aspx > Srinivasan, S. (2014). Cloud Computing Basics. New York: Springer Press. University, R. (2015, February 6). A Picture is Worth 1,000 Words, But How Many Emotions? Retrieved February 8, 2015, from < http://www.sciencedaily.com/releases/2015/02/150206125249.htm > Yang, H. (2012). Software Resue in the Emerging Cloud Computing Era. Hershey: IGI Global Press. Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Technology Research Paper Example | Topics and Well Written Essays - 1000 words - 2”, n.d.)
Information Technology Research Paper Example | Topics and Well Written Essays - 1000 words - 2. Retrieved from https://studentshare.org/information-technology/1676935-new-it-technologies-paper
(Information Technology Research Paper Example | Topics and Well Written Essays - 1000 Words - 2)
Information Technology Research Paper Example | Topics and Well Written Essays - 1000 Words - 2. https://studentshare.org/information-technology/1676935-new-it-technologies-paper.
“Information Technology Research Paper Example | Topics and Well Written Essays - 1000 Words - 2”, n.d. https://studentshare.org/information-technology/1676935-new-it-technologies-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Technology

Nursing Information Technology

Data/ Information Technology 2.... information generation 3.... As we look at this first step in Porters value chain, we realize that there is information here that is certainly not information that we would ever want to be exposed to other places.... This makes one wonder if the reduction in cost by outsourcing is worth the possibility of this information leaving the system.... Then there is the issue of whether failure to transmit the information where it needs to go in a timely manner is possible and sudden changes in the data such as emergent lab changes, are they getting there timely....
3 Pages (750 words) Essay

Outsourcing Information Technology

Out sourcing Information Technology is just not a trend but a cheap and alternative way to get a quality work done by an outsider or an entity.... This is quite rampant at present in countries like US and other western countries not only because outsourcing saves large amount of the companies economy but also the time gap which exists between the countries like India, china, Philippines and other western countries forms a major advantage to the company which out sources the Information Technology....
2 Pages (500 words) Case Study

Investments in Information Technology

The use of Information Technology (IT) in aiding the decision making process of an organization became prevalent as it is seen as an efficient competitive advantage.... Investments in Information Technology The technological revolution brought about many developments in the business arena.... The use of Information Technology (IT) in aiding the decision making process of an organization became prevalent as it is seen as an efficient competitive advantage....
2 Pages (500 words) Essay

Healthcare & Information Technology

In the essay “Healthcare & Information Technology” the author discusses the incorporation of Information Technology in the field of healthcare and the benefits that they have derived from this technology integration.... Healthcare and Information Technology The topmost priority of the professionals is to build a safer and more reliable health system after the integration of Information Technology.... T-enabled decision making Information Technology facilitates the concept that has been desired for many years....
2 Pages (500 words) Essay

Information Technology and Career

The author of this essay under the title "Information Technology and Career" touches upon the important role of Information Technology in the business sector.... According to the text, Information Technology is essential in companies.... hellip; Evidently, Information Technology has played an important role in the business sector.... In addition to that, in this section, we are going to focus on two companies offering Information Technology-related positions....
1 Pages (250 words) Essay

Information technology and society

The issue that I have selected to research in this course is education which is a major society problem and incorporates the use of Information Technology.... Education promotes growth in any Information Technology and society Qn The issue that I have selected to research in this is education which is a major society problem and incorporates the use of Information Technology.... It is an important issue to focus on because knowledge gained through education can be applied in various fields such as health, Information Technology and in technical skills (Petersen, 2002)....
2 Pages (500 words) Assignment

Politics in Information Technology

The paper "Politics in Information Technology " states that … By looking at Information Technology in the perspective of cultural practices, I have realized how it benefits; especially regrind issues such as in regulating, societal, communal and financial practices.... Nonetheless, the relationship between Information Technology and access is remarkable.... Accordingly, Information Technology guarantees new realities where substantial confinements can rise above, and new flexibilities discovered mostly for individuals with handicaps, who are viewed as exceptional recipients of technology....
9 Pages (2250 words) Coursework

About information technology

Information Technology is the computers and other telecommunication application tools for storage, transmission, retrieval and manipulation of data.... It is commonly related to computer networking and it entails all the technologies used in distributing information like… Information Technology relies on other industries like the computer hardware and software, electronic and other related computer services. In the definition of Information Technology, three categories are always considered to explain it; these categories Information Technology Information Technology Introduction Information Technology is the computers and other telecommunication application tools for storage, transmission, retrieval and manipulation of data....
2 Pages (500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us