StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

From vision to virtual to real: how real is cyber-architecture - Essay Example

Cite this document
Summary
With it, man has started to visualize and with that, efforts in the right direction are being made to actually make the dreams see the light of the day. This has happened in the 1990s era and to date it is…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
From vision to virtual to real: how real is cyber-architecture
Read Text Preview

Extract of sample "From vision to virtual to real: how real is cyber-architecture"

Download file to see previous pages

Human needs have given shape to visualization and thus this has enacted the role of technology to greater strengths. With this has come a realization that much more can still be achieved through research in the field of virtual sciences and cyber phenomenon. Cyber architecture has come out as a pertinent issue in this discussion. From telephones to the Internet, multi-language calculators to computers, cars to rockets and satellites, we are submerged in a sea of discoveries and inventions made possible by Science.

(Bell, 2001) views that the virtual environments are trying their best to embrace with their presence and relevant apparatus in our day to day lives. It is only up to us how we want them to become a part of our lives. More so, delving into cyberspace is solely a ‘walkabout’ with which one can enter into a large horizon of endless possibilities. Putting something on to a piece of paper is the just a linear equation since unsuccessful attempts at simulating the paper and its experience on screen can leave quite a huge hole between the real and the unachieved.

What we need to fathom and understand for ourselves is how this gap will be plugged. With that, the possibilities might just increase and thus the cyber world can open its doors to explore its incessant opportunities. (Caneparo, 1997) fathoms that virtual reality is much more than mere 3D representations. He further states that virtual reality is pretty different to animations in the fact that users are actively involved and thus the interaction between the human beings and the computers remain, as will be seen further in this paper, discussed in the Human Computer Interaction paragraph.

The concept of Shared Virtual Reality is somewhat different to the conventional virtual reality as the experience of 3D objects and spaces is not based on a sole discretion rather the same is shared between a number of different users who are sitting at their ends on respective PCs. Thus,

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“From vision to virtual to real: how real is cyber-architecture Essay”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1537413-from-vision-to-virtual-to-real-how-real-is-cyber-architecture
(From Vision to Virtual to Real: How Real Is Cyber-Architecture Essay)
https://studentshare.org/miscellaneous/1537413-from-vision-to-virtual-to-real-how-real-is-cyber-architecture.
“From Vision to Virtual to Real: How Real Is Cyber-Architecture Essay”, n.d. https://studentshare.org/miscellaneous/1537413-from-vision-to-virtual-to-real-how-real-is-cyber-architecture.
  • Cited: 0 times

CHECK THESE SAMPLES OF From vision to virtual to real: how real is cyber-architecture

Information and Network Centric Operations

an emerging concept to the fielding of real operational capability.... This book aims at the Network Centric Warfare concept; to explain how it embodies the characteristics of the Information Age; to identify the challenges in transforming this concept into a real operational capability; and to suggest a prudent approach to meeting these challenges.... The key is how the activities of geographically dispersed and functionally diverse units are orchestrated, or controlled....
13 Pages (3250 words) Essay

Network Solution to Real Vertical Growth Demands

This paper supports the idea of saving on space via acquisition of several servers to be coordinated from the head office in order to avoid running out of space.... This would prevent staff members from storing their work information on their personal machines or lacking trust in the file server (Cyber Security, 2007)....
4 Pages (1000 words) Case Study

The Analysis of the Information Communication Technology

Further, it will detail these threats and vulnerability extensively and how they apply to the business.... Specifically the paper will review the above through the following guidelines: NIST 800-30: Risk Management Guide for Information Technology Systems, NIST 800-53: Recommended Security Controls for Federal Information Systems and Organizations, NIST 800-39: Managing Risk from Information Systems: An Organizational Perspective and NIST 800-64: Security Considerations in the System Development Life Cycle....
5 Pages (1250 words) Assignment

Organized Crime and Detection: Finding and Maximizing Criminal Data

This paper under consideration 'Organized Crime and Detection: Finding and Maximizing Criminal Data" focuses on the fact that organized crime and terrorist activity in the Computer Age takes place on multiple levels, in both the virtual and physical worlds.... Actions can be hidden behind a veil of anonymity that can range from the use of ubiquitous cyber-cafes to sophisticated efforts to cover Internet routing” (Williams, 2002)....
11 Pages (2750 words) Research Paper

Zero Carbon Development in the United Kingdom: Overall Carbon Emissions

hellip; The consultation document also provided a proposed timetable that sought to gradually tighten and revise the country's building regulations starting from the year 2010 through to the year 2013 so as to ensure that the county is able to eventually achieve its aim of zero carbon homes development in all housing projects in both Wales and England....
17 Pages (4250 words) Research Paper

Proposition to Introduce Cloud Client Architecture at Macfarlanes LLP

This report describes the proposition to introduce cloud/client architecture at Macfarlanes LLP.... It aims to present a recommendation that will seek to achieve its successful introduction and implementation.... In conclusion it stipulates advantages and disadvantages of both cloud and client architecture....
6 Pages (1500 words) Report

Health Information Exchange

hellip; The author states that crucial to successes of these programs and realization of the final goal of transformed healthcare systems is the real-time interoperable Health Information Exchange.... The paper “Health Information Exchange” evaluates transforming the delivery of healthcare into a system that is value-based and patient-centered....
10 Pages (2500 words) Research Paper

System Security and Rise of Internet due to Advancement of Information Technology

The perception layer collects data or information and recognizes the real world.... A study shows that IoT permits objects to be controlled and sensed remotely across the present network infrastructure which creates more opportunities for the direct integration of the real-world into the virtual world, and leading to increased accuracy, efficiency, and economic benefit.... hellip; With a tight work schedule and increasing advancement, human beings have now made it a habit to access information and purchase goods just from any location provided they can access the internet....
7 Pages (1750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us