ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Technology Revolutions: Three Critical Reflections

Updated on February 25, 2013

Explain how a database makes paying for a product online possible

by Eric J. Specht


Databases are a large collection of organized information programmed to file or retrieve information instantly. These electronic filing cabinets are available for variety of purposes and may obtain our PIM, personal information managers, which store sensitive information pertaining to our identity such as, name, gender, date of birth, relationship status, address, phone number and sensitive material; like social security numbers, debit and/or credit card information. Database-management systems (DBMS) are tablets of information collected about us pertaining to different reasons for viewing our information (Beekman & Beekman, 2006/2009, pp. 232-269). For example, if I want to purchase an item on the internet, I need to reveal my personal information followed by a payment method. This procedure allows companies DBMS to retrieve my shared PIM data, which determines my identity, for security purposes and mailing coordinates, as well as accessing my financial data to determine the allowance of the purchase. We grant permission for database servers to store and share our information with one another, which allows us to make electronic transactions quickly and efficiently.

What is so special about Arthur C. Clarke in relation to the technological advances of the past three years?

Technology advances in the past three years have revolutionized Arthur C. Clarke’s geostationary satellites for communication purposes. Clark predicted satellites would mimic the earth’s rotation so they could relay information signals that would replace twentieth-century technology. Although we still rely on communication and entertainment cables, his prophecy did not elude the possibilities in advance satellite technology. In recent years satellites synchronized with the Earth’s rotation has brought forth science fiction wireless ideas such as satellite televisions, radios, GPS or Global Positioning Systems, and Wi-Fi , a wireless network technology. Such wireless technologies offer global use, but chosen more often by individuals who live outside of the urban areas. Clarke’s special relation aside from his sci-fi possibilities exists today, instead of listening to music Cd’s or I-Pods; we can wirelessly connect to hundreds of different radio stations via satellite. Geostationary satellites offer driving directions even in a city’s most complex streets to navigate. The most explosive growth today is the demand for “Wi-Fi hot spots” (Beekman & Beekman, 2006/2009, pp. 281) or locations that support internet access. If it were not for his scientific illusions, technology might not be as advanced as it is today.

What are some dark sides to commercializations on the internet, is there a way to maintain a free and open society and limit/decrease some of them?

Internet advertising for businesses or individual use provides a social network for communication, entertainment, and advertising; yet, the internet is an abusive realm where fraudulent activities and illegal actions surge through millions of online connections. Similar to the real world, illegal distributions of materials, such as drugs, weapons, media, and personal information are sold, purchased, and/or stolen on the internet. However, modern technology is difficult to ignore because we, the diverse population, utilize the internet for variety of purposes. To maintain our freedom, limit and/or decrease the amount of illegal cyber traffic, we must take the initiative to secure ourselves beyond existing proprietor and government internet regulations. First, do not compromise your own privacy, read all privacy and security statements before visiting Websites. Secondly, install filtering software that reduces viewing inappropriate media and firewalls that protect your computer from hackers and viruses. Be certain that purchases and other personal information are digitally sent and retrieved on secure sites (Beekman & Beekman, 2006/2009, pp.345-348). Above all, research, acquiring knowledge is your best defense against all types of invasions. Precautions taken to avoid abuse on Earth or in cyberspace may limit our freedom, but at the expense to secure our identities.


Beekman, G., & Beekman, B. (2009). Chapters 7-9. In Tomorrow's Technology and

You (Ninth ed.). New Jersey: Pearson Education, Inc. (Original work

published 2006)


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)