Management Information Technology

Management Information Technology

Introduction

The introduction of information technology was indeed groundbreaking as it marked a new dawn for the contemporary world. Information technology is a term used to underline the application telecommunications equipment and computers in the storage, transmission, as well as manipulation of data usually in the context of business entities. Computation has been around for thousands of years. However, the entry of computers undoubtedly marked an enormous leap with regard to information technology. Needless to say, there have been incredible developments right from the invention of computers. These have been aimed at enhancing efficiency and effectiveness of information technology in the varied functions. This has undoubtedly resulted in the incorporation of information technology in almost every aspect of the contemporary human life. It goes without saying that every year, new developments and leaps in the world of information technology are made. These are incorporated in varied industries including healthcare, security, defense, education, communication and others. On the same note, they have varied impacts on the industries within which they are applied, with some displacing earlier technologies or even complementing. This paper outlines the developments that have recently been made in the world of information technology, as well as their subsequent impacts in their respective industries or the technology industry as a whole.

Kattau, S (2013). Embarcadero RAD Studio XE4 enables ‘true native’ app development. SD Times, web retrieved from HYPERLINK “http://sdt.bz/45657” http://sdt.bz/45657

The release of the RAD Studio XE4 has ushered in Embarcadero Technologies into the debate pitting HTML5 against native code for the development of mobile application. It allows developers to get rid of their HTML5 tools for true native code. While HTML5 comes with enhanced time-to-market, the native code offers better user experience and application performance. RAD Studio XE4 is similar to native Android applications but does not necessarily operate at its best in those. It can be used by developers to create applications for personal computers, smartphones, and tablets thereby giving users an experience equal to applications that are created using platform SDKs. Embarcadero uses compilers and Delphi language thereby developers to write once running true native on the devices. Developers expect that they can write it once using the true native code, as well have it operating on different supported devices, which is what the developing company is doing with Macintosh OS X, Windows 64, Windows 32 and iOS with Delphi, which means that one language is used on one product, a single codebase and one compilation on all platforms. The developers are also working with their C++ compiler so as to give their C++ developers the same capability in the future. Its key features include full application framework for Mac OS X, Windows and iOS, Full Visual designer for user interfaces in Windows, Mac and iOS with numerous orientation and resolutions among other features.

Application analysis

This application allows business application to have up to ten times faster with in-built enterprise class database and visual development support. In addition, it allows developers to design and develop their applications with reusable and extendable visual component building blocks, thereby allowing for highly maintainable and faster development. On the same note, rapid on-device prototyping allows developers to create a visual prototype operating on the target device so they can quickly have feedback and get the applications to market fast. The development of multi-device applications using this software eliminates the necessity of maintaining a separate development project so as to deliver the application natively for multiple devices such as smartphones, Personal computers and tablets on multiple platforms such as Mac, Windows or iOS. On the same note, it eases the process of building script-free and true native applications that expose the entire range of device performance and capabilities incorporated in the underlying devices. On the same note, security from hackers is catered for in the application. A large number of development vendors allow for multi-platform development using runtimes and scripting languages that are targets of notorious hackers thereby presenting inherent security risks on the mobile devices. The studio brings a true native application development thereby allowing the code to run directly on the device and lowering the risk of attacks from third parties.

Shah, A (2013). Powerful thin clients may be alternative to PCs. Infoworld retrieved from HYPERLINK “http://www.infoworld.com/d/computer-hardware/powerful-thin-clients-may-be-alternative-pcs-219255” http://www.infoworld.com/d/computer-hardware/powerful-thin-clients-may-be-alternative-pcs-219255

Thin client was introduced by Hewlett-Packard and Dell with faster processor and high-definition graphic capabilities than the existing thin clients thereby providing an alternative to the conventional personal computers. The desk-side thin clients incorporate advanced visualization features allowing virtual desktops to host numerous applications in a single session. These Thin Clients are essentially personal computers that don’t have local storage but have network connectivity. Virtual desktops on thin clients run applications that are stored in remote servers through virtualization technologies from VMware, Citrix, and Microsoft. They incorporate the capacity to operate high-definition games that are delivered over cloud. While thin-client computing may not be an entirely new idea, the incorporation of cloud comes with a new twist. The new thin client fits in the emerging cloud model considering that more applications are centralized to the data center, not to mention that businesses may consider upgrading Windows XP PCs to thin clients that have the capacity to host Windows 7 instances. While this new device is less expensive than PCs, the implementation of cloud-based computing model with the server and software resources may be expensive. On the same note, as much as the larger part of processing is done on the server side, it is necessary that powerful thin clients are incorporated considering that applications are dependent on heavy-client processing or graphics.

Analysis of its effects

Cloud computing has been all the range in the recent times. It provides an avenue through which an individual has increased capacity and capabilities on the fly without making any investment on new infrastructure, licensing new software or even training new personnel. It encompasses subscription-based that extends the existing capabilities of IT in real time over the internet. This, therefore, eliminates the restrictions pertaining to physical capabilities of computers. This is what the invention of thin clients that have remote servers introduces to the computer world. It is worth noting that the powerful thin clients allow for on the fly performance, which, therefore, increases the flexibility.

Simonite, T (2011). What Bitcoin Is, and Why It Matters. MIT Technology Review retrieved from HYPERLINK “http://www.technologyreview.com/news/424091/what-bitcoin-is-and-why-it-matters/” http://www.technologyreview.com/news/424091/what-bitcoin-is-and-why-it-matters/

This software was born out of the need for individuals to undertake a secure electronic exchange of money without necessarily incorporating the help of a third party like financial institutions. Bitcoin was based on cryptographic techniques that enable individuals to ensure that the money they receive is genuine even when they do not trust the sender. An individual would download the Bitcoin client software and run it, thereby allowing it to connect to a decentralized network of all users of the software through the internet. It would also create a pair of distinctive and mathematically linked keys that the user would need so as to exchange Bitcoins with other clients. One of the keys is public with its version dubbed Bitcoin address being given to other individuals so that they can send the individual Bitcoins, while the other key is private and hidden in the users’ computer. It is impossible to work out an individual’s private key using their public key, therefore, preventing any impersonation. However, the two keys are transferable to another computer as they are stored in a transferable file. Once a transaction is performed the Bitcom software carries out the operations to blend one’s private key and the other party’s public key with the bitcoins that an individual wants to transfer. This operation’s results are sent across the distributed bitcoin network to allow for the verification of the network by bitcoin software clients that are not participating in the transfer.

Analysis

The efficiency and accuracy of the banking sector has been incredibly watered down in the recent times. It is well recognized that a large number of frauds and criminal activities in the banking sector has involved ATMs (Automated Teller Machines). However, it is well recognized that the ATMs are inefficient in a certain way especially considering their affiliation with certain financial institutions and money transfer corporations. Nevertheless, the entry of Bitcoin seems to settle this issue thereby eliminating the need for third parties such as financial institutions in sending and receiving money, as well as ensuring that the money is genuine. This comes with an element of efficiency and effectiveness especially considering that the genuineness of the money is verified, not to mention the security that is encompassed considering that not even a super-computer can crack the private key. Needless to say, it has an enormous effect on the use of financial institutions. Of course, it is worth noting that Bitcoins are not controlled by anybody, not even the federal bank, in which case the fixed supply of money that it allows would make it difficult to undertake deflation of goods and services in the contemporary world, which is extremely dangerous.

Jackson, J (2013). IBM preps SmartCloud for real-time analytics. Infoworld, retrieved from HYPERLINK “http://www.infoworld.com/d/cloud-computing/ibm-preps-smartcloud-real-time-analytics-219274” http://www.infoworld.com/d/cloud-computing/ibm-preps-smartcloud-real-time-analytics-219274

International Business Machines (IBM) intends to use its version 10.5 of its DB2 database on its SmartCloud IaaS (Infrastructure as a Service). This database comes with a new set of technologies that have the capacity to speed up data analysis by over 25 times. SmartCloud has the capacity to run copes of SAP’s HANA in-memory database for development and test jobs. The BLU acceleration technologies incorporated in the DB2 database offers columnar processing where only columns are processed thereby speeding up the performance. In addition, it bypasses unnecessary data and may use multiple processor cores to undertake a query via parallel vector processing techniques. In addition, it incorporates a compression technology that lowers the space needed by a data set while offering easy access for quick analysis. Every DB2 instance on SmartCloud has the capacity to operate on up to 16 processor cores, a combination of which would manage at least a terabyte of memory. This technology would allow a customer to set up a system that can carry out data analysis in real time. Organizations can store data in data warehouse or in Hadoop cluster, after which they would use varied BI tools to get the patterns and other intelligence. It is proposed that the same BI tools are used in keeping data in-memory, as well as analyzing it on the fly. The company offers to run copies of SAP HANA on SmartCloud for data analysis. Nevertheless, pricing information is the company works with individual clients to determine how much the SmartCloud Database service should cost on case-by-case basis.

Analysis of its impact

Like every new technology, the incorporation of the version 10.5 of DB2 database on SmartCloud Iaas is aimed at enhancing efficiency and effectiveness especially with regard to data processing and analysis. This appears to have been met considering that the database incorporates new technologies that can speed up data analysis by more than 25 times, not to mention allowing for compression of data thereby reducing the amount of space that is needed by a data set, while also providing easy access for quick analysis. Needless to say, this is a groundbreaking move by the company considering that it is the first company to undertake

On the same note, choosing not to set the price and allowing it to be determined on a case to case basis is undoubtedly a first as it allows for customization of the database according to the needs of the customer. In addition, the effect of the invention can be felt across the industry with other cloud providers making changes. For example, Google reduced the cost of the Google Cloud Datastore by about 25%, while Microsoft expanded its Azure cloud service to China.

Science News (2013). Facial-Recognition Technology Proves Its Mettle. Science Daily retrieved from HYPERLINK “http://www.sciencedaily.com/releases/2013/05/130524142549.htm” http://www.sciencedaily.com/releases/2013/05/130524142549.htm

This article outlines the development of facial-recognition technologies with three technologies being evaluated. One of the three proved to be effective in providing a “rank one” identification. However, in one of the tests, the suspect could not have his face matched at a high rank because he wore sunglasses. This technology is said to have high accuracy levels (99 percent accurate) under conditions where the face is angled to the camera and in good lighting. It is noted that automatic recognition of face has the capacity to quickly attach a name to a particular face through searching the database of face images and coming up with the closest match, thereby replacing the manual way used by law enforcement agencies. The automatic system speeds up the identification process and eliminates the possibility of an innocent person being incarcerated.

Technology application analysis

Needless to say, this technology comes as extremely crucial to law enforcement forces especially with regard to identification of criminals. In addition, it comes in handy in eliminating the possibility that an innocent person will be incarcerated and questioned for a crime. This means that the law enforcement agencies will not only be using their time more efficiently but also more effectively especially considering the high accuracy levels with which it comes. However, the fact that the technology is unable to function so efficiently in certain conditions such as poor lighting, when the individual is not facing the camera directly or in instances where the individual is wearing sunglasses and other face masking items, underlines the need for increased development, research and innovation so as to enhance its accuracy and effectiveness. This, however, does not undermine its incredible effectiveness and accuracy especially in the right conditions.

References

Kattau, S (2013). Embarcadero RAD Studio XE4 enables ‘true native’ app development. SD Times, web retrieved from HYPERLINK “http://sdt.bz/45657” http://sdt.bz/45657

Science News (2013). Facial-Recognition Technology Proves Its Mettle. Science Daily retrieved from HYPERLINK “http://www.sciencedaily.com/releases/2013/05/130524142549.htm” http://www.sciencedaily.com/releases/2013/05/130524142549.htm

Jackson, J (2013). IBM preps SmartCloud for real-time analytics. Infoworld, retrieved from HYPERLINK “http://www.infoworld.com/d/cloud-computing/ibm-preps-smartcloud-real-time-analytics-219274” http://www.infoworld.com/d/cloud-computing/ibm-preps-smartcloud-real-time-analytics-219274

Simonite, T (2011). What Bitcoin Is, and Why It Matters. MIT Technology Review retrieved from HYPERLINK “http://www.technologyreview.com/news/424091/what-bitcoin-is-and-why-it-matters/” http://www.technologyreview.com/news/424091/what-bitcoin-is-and-why-it-matters/

Shah, A (2013). Powerful thin clients may be alternative to PCs. Infoworld retrieved from HYPERLINK “http://www.infoworld.com/d/computer-hardware/powerful-thin-clients-may-be-alternative-pcs-219255” http://www.infoworld.com/d/computer-hardware/powerful-thin-clients-may-be-alternative-pcs-219255

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply