SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Capabilities of Computing 
Technology 
[Type text] Page 1
Table of Contents 
Capabilities of Computing Technology: ......................................................................................... 3 
Five Capabilities of Computing: ..................................................................................................... 3 
Issues Raised by Storage Devices due to its Application in Computing Technology: ................... 6 
IT Policy Decisions Triggered by Storage Devices: ....................................................................... 8 
Conclusion: ..................................................................................................................................... 9 
References:...................................................................................................................................... 9 
2 
Capabilities of Computer
Capabilities of Computing Technology: 
Computing Technology evolution and dynamism has continued to affect us in all areas of human 
endeavor and has given computers new abilities in today’s technologically advanced world 
thereby making the world aligned in the dissemination and sharing of information and data that 
Computers are used in all aspect of human life and in very different aspects of our daily lives 
from health, military to education and so on and has over the years develop various capabilities 
which includes but are not limited to speed, accuracy, repetitiveness, storage, diligence, 
multimedia handling, connectivity, versatility and so on. 
This development and use of computing technology has given a whole new different meaning to 
conventional standards and norms used in communication and socialization and have also given 
way to various IT policies needed to address possible and potential threats that have risen and 
may arise due to the advent and use of computing technology. 
Computers have been known over the years to processes large volume of data at very 
high speed and this has generally aided its general acceptance worldwide. With computer 
speed reaching up to 100 million operations per second, computers have been able to 
simplify previously bigger task, help in the reduction of manual effort needed for 
competing tasks and the time taken for processing data and also help in accomplishing 
higher number of tasks within specified time. This speed has also helped in the exchange 
3 
were hitherto inaccessible to the common user. 
1. Five Capabilities of Computing: 
 Speed: 
Capabilities of Computer
of information and or data between two or more computer systems connected through an 
Computers have been known not to make mistakes over the years. They have constantly 
retained high levels of precision and accuracy which can be measured as equals to a 
Computers processes and give information based on input from the user. So if it has been 
feed correct input, the output from the computer has 100% correctness while if the input 
feed it is wrong, the output will also have 100% incorrectness. This gave rise to the term 
GIGO – “Garbage In Garbage Out”. This means the output from a computer is highly 
dependent on the input and if the parameters have been wrongly defined by the user, the 
system would accurately continue to give erroneous results whereas if it had been given 
the right parameters it would accurately give an precise result for the entire duration of 
the execution of the particular task(s) (Asaolu, 2006). 
Computing systems has the ability to store huge amount of data and information for 
current usage or future referencing. Its ability for storage is also another major factor of 
its global acceptance aside speed and accuracy. 
Technological revolution, due to easy accessibility of potable music players, digital 
cameras, mobile phones and so on, has responded to personal needs with the 
development of electronic devices that include data storage capabilities. 
Over the years the size of storage have continually increased and cost has decreased 
alongside the needs of the users and now storage of up to terabytes for the conventional 
4 
external or internal network. 
 Accuracy: 
100%. 
 Storage Capacity: 
Capabilities of Computer
computers and portable storage devices and more for servers and super computers have 
Cloud computing has also allowed data to be stored and retrieved easily and conveniently 
on servers with big storage capability from any computer and or mobile device that have 
been given access to the servers which has made accessibility to and availability of 
information and data easily as this could be done from any location and on any computer 
This type of storage has clearly encouraged portability into the more predictable data 
management standards. (Costello, 2009). 
Computing system has the capability to perform high end calculation and processes data 
within seconds which would have been tasking if performed manually. This aided in the 
creation of Artificial Intelligence which is the study of how computing machines can 
imitate human intellect by taking self-decisions based on different courses of action. 
Computing machines are to be developed with the ability to think, act and carry out 
activities like we humans do. These capabilities have led to the creation of Deep Blue, the 
first computer to win the leading chess champion Garry Kasparov in 1996 and NASA 
Valkyrie a humanoid robot (Ackerman, 2013). 
Computing systems have over the years evolved into playing and recording voice and 
video contents which are stored as media files. Multimedia files include graphics, video, 
animation and sound. Multiple media types are used symphonically together in creating 
5 
evolved. 
and or devices. 
 Logical Operations: 
 Multimedia: 
Capabilities of Computer
new experiences in areas such as image processing, video processing, audio analysis, text 
retrieval and understanding, data mining and analysis, and data fusion. 
2. Issues Raised by Storage Devices due to its Application in Computing 
I choose storage devices because the use of portable storage devices has become commonplace 
in the society. This is so because storage has become relatively cheap. Issues have arisen from 
the use of these storage devices which has resulted in severe outcomes to individuals, 
Cloud computing offers large storage space and this storage space are mostly not kept in 
the country where the company is operating from or in country that has little or no 
standard policies on the privacy and security of data thereby raising doubt about the 
privacy of data stored on such storage devices. How secured are sensitive data hosted in 
Also storage devices of old computers raises an important privacy issue as they still 
contain personal and sensitive information such as emails, passwords and credit card 
numbers, also of note is that files that have been thought deleted from system and also 
from the recycle bin have actually not been totally removed from the computers storage 
devices. The files still actually exist on the storage device but are just not visible in the 
directory index. These data or files can be recovered maliciously and used without a trace 
by merely using software that can be obtained freely on the net. 
6 
Technology: 
corporation and organizations. 
 Privacy: 
the cloud? 
Capabilities of Computer
Accessibility of data over the internet and consequent storage of such data on any storage 
media does not give control over ownership of such data. Storage devices are becoming 
smaller in size and bigger in capacity, due to this, organization’s storage devices are to be 
properly labelled and inventoried. For individual, corporation and organization, these 
portable devices are to be kept securely at all times or be stored somewhere safe. 
Data can be transferred from one storage device to another thereby making it difficult to 
exercise control on such data. Therefore organizations should ensure that the use of 
portable storage devices is strictly controlled by ensuring that only authorized portable 
storage devices can be plugged into the system. 
Also issues have been raised over who has control over data being stored or access via 
cloud computing. Issue with theft of data storage devices has also raised serious concern 
over control as they are very small and easily conceivable. 
Data stored on storage devices follow that they are as accurate as the day they were 
stored. This means that unless those data have been previously retrieved, edited and 
saved back onto the storage devices, the data stored on any storage device remain as is. 
Issues raised here might include how accurate data stored on the storage devices are 
especially if they are for personal use that the organization has no controlled over or has 
been stolen or lost and was later retrieved by the owner. There is no telling how accurate 
the information that was on the storage device is to what is on it now after retrieval. 
7 
 Ownership: 
 Control: 
 Accuracy: 
Capabilities of Computer
How secured is our storage devices or how secured is the server or computer on which 
my storage device is mounted are some of the issues raised as pertain to storage. Planned 
and unplanned introduction of viruses, malware and so on through portable storage 
devices can cause harm to the corporate network. It has been established that as of today 
one of the big threats to organization and corporations still comes from trusted insiders. 
This assertion simply suggests that it is the people working inside the company who are 
attacking the systems whether intentionally or unintentionally. 
3. IT Policy Decisions Triggered by Storage Devices: 
The presence of advanced computing will affect the manner in which the data and information 
stored on storage devices are kept safe. Great care should be taken in ensuring that Data storage 
devices, whether be it for cloud computing, the internet (yes the internet, most databases are 
stored on storage devices on the server), portable storage devices and the conventional storage 
devices for personal systems do not fall into the wrongs hand as this can cause serious and or 
substantial damage to the individual, corporation and or organizations. In this regard, the 
following areas of IT policies would be affected: 
 Disclosure of data and information on storage devices. 
 The use of login details may be incorporated into the policy for reducing the chances of 
infiltration into the computer disabling those without correct login credentials access. 
 Networks are to be scanned for unauthorized devices 
8 
 Security: 
Capabilities of Computer
 Data to be stored on storage devices be encrypted 
 Introduction of Portable Storage Devices (PSD) policies 
Computers are still evolving at alarming rate and storage devices will always evolved along too 
as data and information been bandied about have to be kept somewhere for processing currently 
or at a later date. Therefore rules and policies guiding the handling and usage of these devices 
needs to be implemented and enforced strictly in order to avoid substantial damages. Also of 
note is that not implementing these policies can cause harm to the professional, social and 
business ethics of an individual and or organization. 
1. Ackerman, E. (2013) NASA JSC Unveils Valkyrie DRC Robot [online]. Available from: 
http://spectrum.ieee.org/automaton/robotics/military-robots/nasa-jsc-unveils-valkyrie-drc- 
robot (Accessed: 09 February 2014). 
2. Asaolu, O.S. (2006) 'On the Emergence of New Computer Technologies', Educational 
Technology and Society, 9(1), pp.335 - 343. 
3. Costello, T. (2009) Cloud Computing. [Online] Available from: 
http://www.computer.org/portal/web/computingnow/archive/february2009 (Accessed 14 
9 
Conclusion: 
References: 
January 2013) 
Capabilities of Computer
4. McCormick, J. (2002) Take these precautions against inside security attacks [Online] 
Available from: http://www.techrepublic.com/article/take-these-precautions-against-inside- 
security-attacks/ (Accessed: 20 may 2016). 
5. Nakpodia, E.D. (2010) 'An information system in Nigerian education: A study of data 
storage', International Journal of Library and Information Science, 2(6), August, 
10 
pp.102–107. 
Capabilities of Computer

Weitere ähnliche Inhalte

Was ist angesagt?

Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Vishal Tandel
 
Information Technology
Information TechnologyInformation Technology
Information Technologyhari_2u1986
 
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFETHE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFEsyifaaismail
 
Information Technology And Its Importance
Information Technology And Its ImportanceInformation Technology And Its Importance
Information Technology And Its Importanceforpalmigho
 
Modul 1-sample-test
Modul 1-sample-testModul 1-sample-test
Modul 1-sample-teststacio
 
Information Technology
Information TechnologyInformation Technology
Information Technologyshehzadbilal
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lessonMukalele Rogers
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...Michael Lew
 
It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
 
Computer Security for institution
Computer Security for institutionComputer Security for institution
Computer Security for institutionhershanaarachchige
 
Importance of Information Technology - MIT School of Distance Education
Importance of Information Technology - MIT School of Distance Education  Importance of Information Technology - MIT School of Distance Education
Importance of Information Technology - MIT School of Distance Education MIT School
 

Was ist angesagt? (20)

Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Systems analysis and design lecture 1
Systems analysis and design lecture 1Systems analysis and design lecture 1
Systems analysis and design lecture 1
 
Notacd02
Notacd02Notacd02
Notacd02
 
B1802041217
B1802041217B1802041217
B1802041217
 
Data, data slides
Data, data  slidesData, data  slides
Data, data slides
 
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFETHE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
 
Information Technology And Its Importance
Information Technology And Its ImportanceInformation Technology And Its Importance
Information Technology And Its Importance
 
Modul 1-sample-test
Modul 1-sample-testModul 1-sample-test
Modul 1-sample-test
 
G033030035
G033030035G033030035
G033030035
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lesson
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
Computer Security for institution
Computer Security for institutionComputer Security for institution
Computer Security for institution
 
Information technology
Information technologyInformation technology
Information technology
 
Chapter 03 pertemuan 4- donpas- concept and management
Chapter 03  pertemuan 4- donpas- concept and managementChapter 03  pertemuan 4- donpas- concept and management
Chapter 03 pertemuan 4- donpas- concept and management
 
Importance of Information Technology - MIT School of Distance Education
Importance of Information Technology - MIT School of Distance Education  Importance of Information Technology - MIT School of Distance Education
Importance of Information Technology - MIT School of Distance Education
 

Andere mochten auch (10)

UDI MOVERSE ES SALUD
UDI    MOVERSE ES SALUDUDI    MOVERSE ES SALUD
UDI MOVERSE ES SALUD
 
Marketing ppt
Marketing pptMarketing ppt
Marketing ppt
 
Marketing ppt
Marketing pptMarketing ppt
Marketing ppt
 
GERALD BUSCA BDN Inno CV
GERALD BUSCA BDN Inno CVGERALD BUSCA BDN Inno CV
GERALD BUSCA BDN Inno CV
 
MCSA 70-412 Chapter 05
MCSA 70-412 Chapter 05MCSA 70-412 Chapter 05
MCSA 70-412 Chapter 05
 
MCSA 70-412 Chapter 08
MCSA 70-412 Chapter 08MCSA 70-412 Chapter 08
MCSA 70-412 Chapter 08
 
MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12
 
MCSA 70-412 Chapter 09
MCSA 70-412 Chapter 09MCSA 70-412 Chapter 09
MCSA 70-412 Chapter 09
 
MCSA 70-412 Chapter 07
MCSA 70-412 Chapter 07 MCSA 70-412 Chapter 07
MCSA 70-412 Chapter 07
 
MCSA 70-412 Chapter 02
MCSA 70-412 Chapter 02MCSA 70-412 Chapter 02
MCSA 70-412 Chapter 02
 

Ähnlich wie Capabilities of Computing Technology

Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmIRJET Journal
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET Journal
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary StorageJessica Tanner
 
melding digital asset management
melding digital asset managementmelding digital asset management
melding digital asset managementDavid Miller
 
Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Isuru Vincent
 
Edge Computing.docx
Edge Computing.docxEdge Computing.docx
Edge Computing.docxSVITSEEERK
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Kenneth Regalado
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
Revenue Cycle
Revenue CycleRevenue Cycle
Revenue CycleKim Moore
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyChristoanSmit
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloudijtsrd
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingMangaiK4
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingMangaiK4
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
Business Continuity Plan Essay
Business Continuity Plan EssayBusiness Continuity Plan Essay
Business Continuity Plan EssayKristi Anderson
 

Ähnlich wie Capabilities of Computing Technology (20)

Topic 7
Topic 7Topic 7
Topic 7
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary Storage
 
melding digital asset management
melding digital asset managementmelding digital asset management
melding digital asset management
 
Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)
 
Edge Computing.docx
Edge Computing.docxEdge Computing.docx
Edge Computing.docx
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Revenue Cycle
Revenue CycleRevenue Cycle
Revenue Cycle
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Business Continuity Plan Essay
Business Continuity Plan EssayBusiness Continuity Plan Essay
Business Continuity Plan Essay
 

Kürzlich hochgeladen

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Kürzlich hochgeladen (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Capabilities of Computing Technology

  • 1. Capabilities of Computing Technology [Type text] Page 1
  • 2. Table of Contents Capabilities of Computing Technology: ......................................................................................... 3 Five Capabilities of Computing: ..................................................................................................... 3 Issues Raised by Storage Devices due to its Application in Computing Technology: ................... 6 IT Policy Decisions Triggered by Storage Devices: ....................................................................... 8 Conclusion: ..................................................................................................................................... 9 References:...................................................................................................................................... 9 2 Capabilities of Computer
  • 3. Capabilities of Computing Technology: Computing Technology evolution and dynamism has continued to affect us in all areas of human endeavor and has given computers new abilities in today’s technologically advanced world thereby making the world aligned in the dissemination and sharing of information and data that Computers are used in all aspect of human life and in very different aspects of our daily lives from health, military to education and so on and has over the years develop various capabilities which includes but are not limited to speed, accuracy, repetitiveness, storage, diligence, multimedia handling, connectivity, versatility and so on. This development and use of computing technology has given a whole new different meaning to conventional standards and norms used in communication and socialization and have also given way to various IT policies needed to address possible and potential threats that have risen and may arise due to the advent and use of computing technology. Computers have been known over the years to processes large volume of data at very high speed and this has generally aided its general acceptance worldwide. With computer speed reaching up to 100 million operations per second, computers have been able to simplify previously bigger task, help in the reduction of manual effort needed for competing tasks and the time taken for processing data and also help in accomplishing higher number of tasks within specified time. This speed has also helped in the exchange 3 were hitherto inaccessible to the common user. 1. Five Capabilities of Computing:  Speed: Capabilities of Computer
  • 4. of information and or data between two or more computer systems connected through an Computers have been known not to make mistakes over the years. They have constantly retained high levels of precision and accuracy which can be measured as equals to a Computers processes and give information based on input from the user. So if it has been feed correct input, the output from the computer has 100% correctness while if the input feed it is wrong, the output will also have 100% incorrectness. This gave rise to the term GIGO – “Garbage In Garbage Out”. This means the output from a computer is highly dependent on the input and if the parameters have been wrongly defined by the user, the system would accurately continue to give erroneous results whereas if it had been given the right parameters it would accurately give an precise result for the entire duration of the execution of the particular task(s) (Asaolu, 2006). Computing systems has the ability to store huge amount of data and information for current usage or future referencing. Its ability for storage is also another major factor of its global acceptance aside speed and accuracy. Technological revolution, due to easy accessibility of potable music players, digital cameras, mobile phones and so on, has responded to personal needs with the development of electronic devices that include data storage capabilities. Over the years the size of storage have continually increased and cost has decreased alongside the needs of the users and now storage of up to terabytes for the conventional 4 external or internal network.  Accuracy: 100%.  Storage Capacity: Capabilities of Computer
  • 5. computers and portable storage devices and more for servers and super computers have Cloud computing has also allowed data to be stored and retrieved easily and conveniently on servers with big storage capability from any computer and or mobile device that have been given access to the servers which has made accessibility to and availability of information and data easily as this could be done from any location and on any computer This type of storage has clearly encouraged portability into the more predictable data management standards. (Costello, 2009). Computing system has the capability to perform high end calculation and processes data within seconds which would have been tasking if performed manually. This aided in the creation of Artificial Intelligence which is the study of how computing machines can imitate human intellect by taking self-decisions based on different courses of action. Computing machines are to be developed with the ability to think, act and carry out activities like we humans do. These capabilities have led to the creation of Deep Blue, the first computer to win the leading chess champion Garry Kasparov in 1996 and NASA Valkyrie a humanoid robot (Ackerman, 2013). Computing systems have over the years evolved into playing and recording voice and video contents which are stored as media files. Multimedia files include graphics, video, animation and sound. Multiple media types are used symphonically together in creating 5 evolved. and or devices.  Logical Operations:  Multimedia: Capabilities of Computer
  • 6. new experiences in areas such as image processing, video processing, audio analysis, text retrieval and understanding, data mining and analysis, and data fusion. 2. Issues Raised by Storage Devices due to its Application in Computing I choose storage devices because the use of portable storage devices has become commonplace in the society. This is so because storage has become relatively cheap. Issues have arisen from the use of these storage devices which has resulted in severe outcomes to individuals, Cloud computing offers large storage space and this storage space are mostly not kept in the country where the company is operating from or in country that has little or no standard policies on the privacy and security of data thereby raising doubt about the privacy of data stored on such storage devices. How secured are sensitive data hosted in Also storage devices of old computers raises an important privacy issue as they still contain personal and sensitive information such as emails, passwords and credit card numbers, also of note is that files that have been thought deleted from system and also from the recycle bin have actually not been totally removed from the computers storage devices. The files still actually exist on the storage device but are just not visible in the directory index. These data or files can be recovered maliciously and used without a trace by merely using software that can be obtained freely on the net. 6 Technology: corporation and organizations.  Privacy: the cloud? Capabilities of Computer
  • 7. Accessibility of data over the internet and consequent storage of such data on any storage media does not give control over ownership of such data. Storage devices are becoming smaller in size and bigger in capacity, due to this, organization’s storage devices are to be properly labelled and inventoried. For individual, corporation and organization, these portable devices are to be kept securely at all times or be stored somewhere safe. Data can be transferred from one storage device to another thereby making it difficult to exercise control on such data. Therefore organizations should ensure that the use of portable storage devices is strictly controlled by ensuring that only authorized portable storage devices can be plugged into the system. Also issues have been raised over who has control over data being stored or access via cloud computing. Issue with theft of data storage devices has also raised serious concern over control as they are very small and easily conceivable. Data stored on storage devices follow that they are as accurate as the day they were stored. This means that unless those data have been previously retrieved, edited and saved back onto the storage devices, the data stored on any storage device remain as is. Issues raised here might include how accurate data stored on the storage devices are especially if they are for personal use that the organization has no controlled over or has been stolen or lost and was later retrieved by the owner. There is no telling how accurate the information that was on the storage device is to what is on it now after retrieval. 7  Ownership:  Control:  Accuracy: Capabilities of Computer
  • 8. How secured is our storage devices or how secured is the server or computer on which my storage device is mounted are some of the issues raised as pertain to storage. Planned and unplanned introduction of viruses, malware and so on through portable storage devices can cause harm to the corporate network. It has been established that as of today one of the big threats to organization and corporations still comes from trusted insiders. This assertion simply suggests that it is the people working inside the company who are attacking the systems whether intentionally or unintentionally. 3. IT Policy Decisions Triggered by Storage Devices: The presence of advanced computing will affect the manner in which the data and information stored on storage devices are kept safe. Great care should be taken in ensuring that Data storage devices, whether be it for cloud computing, the internet (yes the internet, most databases are stored on storage devices on the server), portable storage devices and the conventional storage devices for personal systems do not fall into the wrongs hand as this can cause serious and or substantial damage to the individual, corporation and or organizations. In this regard, the following areas of IT policies would be affected:  Disclosure of data and information on storage devices.  The use of login details may be incorporated into the policy for reducing the chances of infiltration into the computer disabling those without correct login credentials access.  Networks are to be scanned for unauthorized devices 8  Security: Capabilities of Computer
  • 9.  Data to be stored on storage devices be encrypted  Introduction of Portable Storage Devices (PSD) policies Computers are still evolving at alarming rate and storage devices will always evolved along too as data and information been bandied about have to be kept somewhere for processing currently or at a later date. Therefore rules and policies guiding the handling and usage of these devices needs to be implemented and enforced strictly in order to avoid substantial damages. Also of note is that not implementing these policies can cause harm to the professional, social and business ethics of an individual and or organization. 1. Ackerman, E. (2013) NASA JSC Unveils Valkyrie DRC Robot [online]. Available from: http://spectrum.ieee.org/automaton/robotics/military-robots/nasa-jsc-unveils-valkyrie-drc- robot (Accessed: 09 February 2014). 2. Asaolu, O.S. (2006) 'On the Emergence of New Computer Technologies', Educational Technology and Society, 9(1), pp.335 - 343. 3. Costello, T. (2009) Cloud Computing. [Online] Available from: http://www.computer.org/portal/web/computingnow/archive/february2009 (Accessed 14 9 Conclusion: References: January 2013) Capabilities of Computer
  • 10. 4. McCormick, J. (2002) Take these precautions against inside security attacks [Online] Available from: http://www.techrepublic.com/article/take-these-precautions-against-inside- security-attacks/ (Accessed: 20 may 2016). 5. Nakpodia, E.D. (2010) 'An information system in Nigerian education: A study of data storage', International Journal of Library and Information Science, 2(6), August, 10 pp.102–107. Capabilities of Computer