DOC PREVIEW
Southern Miss CSC 309 - Unwrapping the Gift - Chapter 1

This preview shows page 1-2-23-24 out of 24 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Ch1 Unwrapping the GiftChangeA Little HistorySlide 4Slide 5IssuesThemesSlide 8Slide 9Slide 10ObservationsBenefitsEducation and TrainingAutomationBenefits for the DisabledOther BenefitsEveVeriChipIsraeli start-up, VeterixJapanese Billboards Are Watching Back'Smart' Cameras Are Watching YouNew Car CapabilitiesFirst Gulfport Black Box Conviction 7/10/09Lots of Benefits, but -1/16/01 Miller CSC3091Ch1 Unwrapping the Gift1/27/09 Miller CSC3092Change“Everything that can be invented has been invented” – Charles Duell, Director of the U.S. Patent Office, 1899.In 1943 IBM almost did not get into the computer business because they estimated the world need for computers at five. By 1994 weekly production of chips was approximately one billion.1/16/01 Miller CSC3093A Little History1642 - Blaise Pascal begins work on a mechanical calculator. 1801 – Joseph-Marie Jacquard invents an automated loom.1822 – Charles Babbage completes working model of his “Difference Engine”. Designed“Analytical Engine” while working on previous design. Work documented by Lord Byron’s daughter, Augusta Ada Byron, Countess of Lovelace.12/31/01 Miller CSC3094A Little History1890 – Herman Hollerith uses punched cards and equipment he has invented to complete the US census in six weeks (1880 census took nine years).1924 - Hollerith’s Tabulating-Recording Company becomes IBM.1945 – ENIAC completed. 1951 – EDVAC, the first stored program, built by John von Neumann.9/25/08 Miller CSC3095A Little History1954 – UNIVAC I becomes first computer sold to Defense Department.1954-57 – Fortran (it was FORTRAN then)1955 – Transistors used in a computer.1959 – Integrated circuits.1960 – IBM 1620 “CADET”1964 – IBM System/360 and DEC PDP-8.1977 – Personal computers. (Apple II, TRS80, Commodore PET.)1981 – IBM PC7/30/01 Miller CSC3096Issues•Unemployment•Alienation and customer service•Crime•Loss of privacy•ErrorsThe introduction of computers into a wide variety of areas such as banking, education, communication, etc. raise concerns about:1/16/01 Miller CSC3097ThemesChanges in technology usually require adaptive changes in laws, social institutions, policies, and personal skills and attitudes.(New technology can make actions possible that did not exist when existing laws were written and therefore or neither illegal or criminal.)7/30/01 Miller CSC3098ThemesAs cyberspace develops, it will have many of the problems, annoyances, and controversiesof noncyber life: crime, pornography, pedophiles, hate speech, violent fiction, advertising, copy-right infringement, gambling, etc.(The root of the problem is not always the computer but may be human nature, lack of ethics, politics, or other factors.)1/14/09 Miller CSC3099ThemesDiversity/variation in:In the quality and accessibility of computer resources.In the policies adopted by businesses, producers, and users.In the preferences for products and services,safety, privacy, work environment, etc.8/22/01 Miller CSC30910ThemesThere are going to be differences between personal choices, policies of businesses and organizations, and the law.Responsibility12/31/01 Miller CSC30911ObservationsTechnology is amoral. If something is technologically possible, somebody is going to do it. If something is created, it will probably be both used and abused. (David Coursey 12/19/01)7/30/01 Miller CSC30912Benefits•Common uses (word processing, spread sheets, database)•Communications and Information Services (e-mail, web news, library document identification and retrieval, weather)•Automobiles (fuel efficiency, warning systems, radar, infrared, GPS, automatic messaging, design)1/16/01 Miller CSC30913Education and Training•Crime Fighting•Medical Devices•Patient Records•Databases and Information Systems•Medical Diagnosis•Telemedicine•Automation8/22/01 Miller CSC30914Automation•Computer controlled production•Computer controlled inventory•Computer controlled distribution•Use of robots1/16/01 Miller CSC30915Benefits for the DisabledInput and output devices, speech synthesizers, brail output, text size output, (any fine motor skill can be used to communicate with a computer – current efforts are into communication by thinking about it), voice activation, macular degeneration advances, limb and organ replacement.1/14/09 Miller CSC30916Other BenefitsIdentification Systems: Bar codes, credit cards, smart cards, product tracking.Paper reduction: Great promise not much results.Data retrieval, major advance.2/4/09 Miller CSC30917EveEuropean researchers have developed a robot called Eve that uses artificial intelligence, data mining, and knowledge discovery technology to analyze the results of the pharmacological experiments that it conducts. Eve is the first robot-based computer system capable of originating its own experiments, physically performing them, interpreting the results, and repeating the cycle. ICT Results (02/02/09)12/31/01 Miller CSC30918VeriChipFirst installed in a person in December of 2001, the VeriChip extends the chip implant practicesused to identify and track livestock, pets, and even salmon. Described as the size of a Tic Tacmint and inserted under the skin current versions store approximately one paragraph of information and can be used to keep track ofhardware (pacemakers etc.) implanted in a person. Also used for identification.12/10/08 Miller CSC30919Israeli start-up, VeterixDeveloped an electronic capsule that sits in the stomach of a cow, sheep, or goat, sending out real-time information on the health of the herd, to the farmer via Email or cell phone. The e-capsule, which also sends out alerts if animals are distressed, injured, or lost, is also used for identification.Israel21c Karin Kloosterman December 31, 200612/17/08 Miller CSC30920Japanese Billboards Are Watching BackA small camera, connected to image-processing software, has been set up above a flat-panel display. A second camera, tied to a PC using image detection software, is used to estimate how many people standing in front of The signboard ads actually look at them. IDG News Service (12/12/08) Williams, Martyn1/14/09 Miller CSC30921'Smart' Cameras Are Watching YouOhio State University (OSU) researchers are developing a "smart" surveillance system that will be able to determine if a person on the street appears to be lost or is acting suspiciously. The goal is to create a network of smart video cameras that will allow officers to quickly and


View Full Document

Southern Miss CSC 309 - Unwrapping the Gift - Chapter 1

Download Unwrapping the Gift - Chapter 1
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Unwrapping the Gift - Chapter 1 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Unwrapping the Gift - Chapter 1 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?