Tuesday, May 5, 2020

Information and Communication Technologies Development †Free Samples

Question: Discuss about the Information and Communication Technologies Development. Answer: Introduction Internet of things is one of the next-generation technologies. It mainly consists of all devices that have been connected via the internet. In the year 2014, it was predicted that by the time we reach 2020, there will be over twenty-five billion devices connected to the internet of things (Bennett, 2015). These devices are the ones we use every day and are internet-enabled, or they could be devices that can only be used while connected in a networked environment. Internet of things just like any technology does not come without problems. Internet of things brings with it as many disadvantages as it does bring advantages. We are talking about billions of connected devices that means that there are as many interconnects. With all these devices connected, the most significant challenge that arises is how to manage these devices while ensuring privacy given the fact of the existing connections. Confidentiality of data, files, information, and users including their data is always a concern (Singer J, 2002). People share their data over the internet; names, emails, credit/debit card numbers, socio security numbers among other confidential info. Now, the question is, with all these shared data and the billion interconnections, how do we ensure that sensitive data does not fall into the wrong hands? Privacy of data and users of the internet of things Naming and organization of the devices connected to the internet of things Tracking and monitoring of connected devices Communication between all the devices Research issues related to Internet of Things In the year 2014, it was predicted that by the time we reach 2020, there will be over twenty-five billion devices connected to the internet of things. These devices are the ones we use every day and are internet-enabled, or they could be devices that can only be used while connected in a networked environment. Internet of things just like any technology does not come without problems. It raises concerns like: Naming problems can be resolved by use of Dynamic Naming System DNS, Devices that need to be connected to the internet will have unique IP addresses assigned to them. How will they communicate with each other midst billions and billions of interconnections? Communication between servers and client is provided by TCP/IP model. The client does not need to communicate to other clients as they are not offering any service. How will we keep track and monitor all the devices? This invokes the question of privacy of these devices and their users. How will the performance of these devices be determined and improved when the need arises? As technological advancements grow each day, more and more gigabytes of data will be sent to cloud thereby stressing the network. What of the privacy of all these devices? How will it be guaranteed? We can use big data and intelligence tools to alert us when there is a breach of privacy. Maintenance is critical. How will we maintain billions of connected devices? Internet of things just like any technology does not come without problems. It raises concerns like: Naming problems can be resolved by use of Dynamic Naming System DNS, Devices that need to be connected to the internet will have unique IP addresses assigned to them. From my vantage point, there's no reason not to utilize the admired Domain Name System (DNS), which is similarly also suited to naming fridges as it is Linux servers. Using DNS implies not creating another namespace for naming gadgets or making new conventions to determine those names, and we can depend on years of industry experience and aptitude. Communication between servers and client is provided by TCP/IP model. The client does not need to communicate to other clients as they are not offering any service. A typical model now expects gadgets to be customers that depend on the producer's cloud-based servers to work. For instance, my Internet-empowered indoor regulator and the application on my telephone that controls it didn't convey specifically, shared. Instead, each discusses autonomously with the cloud and meet there. Tracking and monitoring of interconnected devices This invokes the question of privacy of these devices and their users. Each machine that works in each market and division can be associated with the Internet. How would we track these gadgets, guaranteeing these billions of "things" are up? What will be best practices for observing for seizes or blackouts? There are likewise protection issues around following and checking that will probably rule the discourse as these innovations multiply. How will the performance of these devices be determined and improved when the need arises? As technological advancements progress each day, more and more gigabytes of data will be sent to cloud thereby stressing the network. What of the privacy of all these devices? How will it be guaranteed? We can use big data and intelligence tools to alert us when there is a breach of confidentiality. Maintenance is critical. How will we maintain billions of connected devices? We as a whole realize that unmaintained PCs have all way of stuff onto the Internet, and the vast majority of those have a working framework that is kept up by somebody. Interestingly, numerous IoT merchants have officially left the business, and their gadgets may well be loaded with bugs that no one will ever have the capacity to settle. What does that do to the Internet's ability to manage malevolent performing artists? Furthermore, by what method will execution and enhancement issues over the Internet be distinguished and settled in such a vigorous and quick evolving condition? Proposed solution to improve the solution further Major stakeholders in the field of the internet of things have already come up with set standards of how the internet of things will be operated and managed. For instance, Devices connected to the internet are named by use of an IP address which is unique to any single device that is connected to the internet (Tatnall, 2017). When it comes to solutions I would want to recommend on; I will use the issue of privacy. Internet providers, governing bodies and technology innovators have mostly taken care of confidentiality while coming up with their software and systems. However, the users ignore these standards and end up exposing themselves to potential privacy violations (BLOOMBERG, 2017). For instance, while using Gmail and on receiving mail, Gmail has provided a mechanism where all the attachments are scanned for possible malwares. Contrary, some users just download the attachments without scanning them and end up being privacy violation victims. Without imagination, our ability to see things as they might be and just as they are at a given moment cannot happen. Einsteins quotes Imagination is more important than knowledge. Knowledge is limited. Imagination encircles the world. For us to improve our imaginations, we must be very creative, and for us to be creative, we need to be open to the world of possibilities. All these we can do if we change how we perceive things. We should be free to everything, old, new, true, false and even factious things. To improve our perception of things we need to increase our knowledge. This can happen in many ways even without much efforts; reading a blog, a novel, watching a video, seated somewhere making observations, carrying out experiments among many other things. While conducting my research about the issues that surround the internet of things, I have increased my knowledge. I now know that the internet of things is already happening by us being able to connect to the internet every day as we go about our daily business. For instance, a learner in the US will comfortably receive help through video conferencing by an expert in the field who is in Japan (Panda, 2017). Video calling can be done via Google Hangout or even Skype. While doing the research, I can now imagine how business meetings can be conducted by a companys board members while everyone is miles away from each other all by use of teleconferencing technologies. The process of learning is continuous. I have been able to learn the issues that revolve around the internet of things. During my research, I have seen how system users make themselves vulnerable to attacks and hacks which would have otherwise been avoided. For instance, leaving your accounts logged in while you were using cyber services (Nayak, 2017). The next customer who comes has access to all your details even without struggles. I have learned recommended practices when it comes to the use of internet of things. For instance, Use of unique and a different password all together for your online sites. Logging out after you are done with an account, scanning any attachments sent via email before downloading them to my PC, making sure your PC has antivirus software and that they are up to date, etc. References Anokwa, Y., Hartung, C., Lerer, A., DeRenzi, B., Borriello, G. (2009). A new generation of open source data collection tools. 2009 International Conference On Information And Communication Technologies And Development (ICTD). https://dx.doi.org/10.1109/ictd.2009.5426732 Bennett, S. (January 01, 2015). The Internet of Things.Transport Topics. BLOOMBERG, J. (2017). 7 Reasons Why the Internet of Things Is Doomed. WIRED. Retrieved 18 August 2017, from https://www.wired.com/insights/2014/07/7-reasonsinternet-things-doomed/ Cheung, H., Elkhodr, M., Shahrestani, S. (January 01, 2017). Internet of Things Applications. Cybersecurity Risk Management Focus In Hitrust Catalogue. (n.d.). Retrieved from https://healthitsecurity.com/news/cybersecurity-risk-management-focus-in-hitrust Davison, R. Ethics and research methods. Proceedings Of The 35Th Annual Hawaii International Conference On System Sciences. https://dx.doi.org/10.1109/hicss.2002.994382 Nayak, P. (January 01, 2017). Internet of Things Services, Applications, Issues, and Challenges. Organisation for Economic Co-operation and Development. (January 01, 2016). The Internet of Things: Seizing the Benefits and Addressing the Challenges. Panda, S. (January 01, 2017). Security Issues and Challenges in Internet of Things. Singer, J., Vinson, N. (2002). Ethical issues in empirical studies of software engineering. IEEE Transactions On Software Engineering, 28(12), 1171-1180. https://dx.doi.org/10.1109/tse.2002.1158289 Tatnall, A., Davey, B. (January 01, 2017). The Internet of Things and Beyond.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.