ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Technology Revolutions: Three Critical Reflections

Updated on February 25, 2013

Explain how a database makes paying for a product online possible

by Eric J. Specht

2010

Databases are a large collection of organized information programmed to file or retrieve information instantly. These electronic filing cabinets are available for variety of purposes and may obtain our PIM, personal information managers, which store sensitive information pertaining to our identity such as, name, gender, date of birth, relationship status, address, phone number and sensitive material; like social security numbers, debit and/or credit card information. Database-management systems (DBMS) are tablets of information collected about us pertaining to different reasons for viewing our information (Beekman & Beekman, 2006/2009, pp. 232-269). For example, if I want to purchase an item on the internet, I need to reveal my personal information followed by a payment method. This procedure allows companies DBMS to retrieve my shared PIM data, which determines my identity, for security purposes and mailing coordinates, as well as accessing my financial data to determine the allowance of the purchase. We grant permission for database servers to store and share our information with one another, which allows us to make electronic transactions quickly and efficiently.

What is so special about Arthur C. Clarke in relation to the technological advances of the past three years?

Technology advances in the past three years have revolutionized Arthur C. Clarke’s geostationary satellites for communication purposes. Clark predicted satellites would mimic the earth’s rotation so they could relay information signals that would replace twentieth-century technology. Although we still rely on communication and entertainment cables, his prophecy did not elude the possibilities in advance satellite technology. In recent years satellites synchronized with the Earth’s rotation has brought forth science fiction wireless ideas such as satellite televisions, radios, GPS or Global Positioning Systems, and Wi-Fi , a wireless network technology. Such wireless technologies offer global use, but chosen more often by individuals who live outside of the urban areas. Clarke’s special relation aside from his sci-fi possibilities exists today, instead of listening to music Cd’s or I-Pods; we can wirelessly connect to hundreds of different radio stations via satellite. Geostationary satellites offer driving directions even in a city’s most complex streets to navigate. The most explosive growth today is the demand for “Wi-Fi hot spots” (Beekman & Beekman, 2006/2009, pp. 281) or locations that support internet access. If it were not for his scientific illusions, technology might not be as advanced as it is today.

What are some dark sides to commercializations on the internet, is there a way to maintain a free and open society and limit/decrease some of them?

Internet advertising for businesses or individual use provides a social network for communication, entertainment, and advertising; yet, the internet is an abusive realm where fraudulent activities and illegal actions surge through millions of online connections. Similar to the real world, illegal distributions of materials, such as drugs, weapons, media, and personal information are sold, purchased, and/or stolen on the internet. However, modern technology is difficult to ignore because we, the diverse population, utilize the internet for variety of purposes. To maintain our freedom, limit and/or decrease the amount of illegal cyber traffic, we must take the initiative to secure ourselves beyond existing proprietor and government internet regulations. First, do not compromise your own privacy, read all privacy and security statements before visiting Websites. Secondly, install filtering software that reduces viewing inappropriate media and firewalls that protect your computer from hackers and viruses. Be certain that purchases and other personal information are digitally sent and retrieved on secure sites (Beekman & Beekman, 2006/2009, pp.345-348). Above all, research, acquiring knowledge is your best defense against all types of invasions. Precautions taken to avoid abuse on Earth or in cyberspace may limit our freedom, but at the expense to secure our identities.

References

Beekman, G., & Beekman, B. (2009). Chapters 7-9. In Tomorrow's Technology and

You (Ninth ed.). New Jersey: Pearson Education, Inc. (Original work

published 2006)

Comments

    0 of 8192 characters used
    Post Comment

    No comments yet.