Free Essay

Future of Technology

In: Computers and Technology

Submitted By djame
Words 2341
Pages 10
THE FUTURE OF TECHNOLOGY
BY DEBRA JAMES
WIU IT-330

Abstract
Once before there was a business profit speed breaker called Macro Virus, and today it is still prevalent to a lesser extent, even though; Microsoft did do something about it, to where it is under control, but; still very much around. (Brightub articles 2011) .explains the well knows macro virus was a stark reminder of its disastrous power.
In today’s world of technology computer viruses attack the software of a computer- the operating system usually attacks the software. (Microsoft /TechNet 2011), states the macro virus is known as a written virus in the internal macro language of applications. In some cases macro virus can cause no damage to the data, however; in other cases, macros viruses have been written that can cause damage to your work. This paper explains. What macro viruses are? How they spread. What affect they have? How to avoid a macro virus How to protect your computer

What are Macro viruses…..?
A macro virus is a computer infraction written in macro language, which is commonly built into word processing applications. (Goggle 2011, pg., 1) In general, Marcos viruses are a series of commands and executions that help automate specific tasks. Regardless of how many they create, they must be executed by a system that is able to interpret stored commands. There are some macro systems that are actually self-contained utilities while others are built into more advanced applications for users to easily repeat a sequence of commands or enable a programmer to customize the application to suite the user’s needs. (Marti, 2011 pg.1) explains while there is no concrete definition of a computer virus, some if not all will agree that it refers to an executable code, (programming language), that, when the run, will attach to or infects other files or applications in the host computer in an effort to reproduce and or cause disruption.
Some viruses are very serious, causing files to erase or lock, while others may create less devastating, but; be very time-consuming problems by altering the file they infect. For example computer viruses come in a variety of strengths, shapes, and sizes, file infectors damage files within specific programs and are invoked each time the infected programs are used,(Marti, 2011 pg.2). Some macro viruses such as Mellissa are spreaded very easily through the auto execution capabilities in word processing products like Microsoft word and excel. According to (Marti 2011, pg. 2) the spread of macro viruses were discovered in March of 1999. Macro virus was propagating via emails attachments. And in less than 48hrs, it was reported a widespread of attack of viruses throughout many major U.S. corporations, that were disrupting business and causing their information systems managers to quickly develop internal defensive strategies. Whether you were new to the net, or a veteran, everyone received this email at least once informing of this horrible viruses, which will gobble up your hard drive. In years to come I can imagine several technology related trends happening within five years: such as * Keyboards and screens will be one input to several networked computers. Game controllers like the XBOX 360 will be another. The difference? They’ll back-end into the same general environment, with only their front-end processing differences to separate them in our minds. (course material chap 7,8,9) * Other devices will share the network, including a media player over by our TV screen, maybe another in the kitchen to manage smart appliances or at least manage another destination appliance or two. * Portable devices (wireless or wimax) will connect me to my home system remotely, or virtual, or at least network portals between my stuff and your stuff * GSP’s will be able to locate any and everything on the spot, everything will be done by computer, doctors apt, errands, and etc. technology will be the way.
How They Spread………
A macro virus can be spreaded through email attachments, discs, networks, modems, and the internet and is notoriously difficult to detect. (Marti 2011pg.2) Uninfected documents contain normal macros. Most Macro viruses are spreaded because the viruses are written in the macro language of the product, which spreads as soon as it is open. The system infectors attach to the portion of a floppy or hard disk that is set aside to boot the computer operating system.
Marti, 2011, pg. 2) states it was one afternoon in march of 1999 when the world began to hear of the spread that a Microsoft word Marco virus was propagating, via threw email attachments, and within the next 48hrs, it was reported that a widespread attacks of macro virus throughout many major U.S. corporations, disrupting business and causing information systems managers to quickly develop internal defensive strategies. The antivirus software vendors doubled the Marco virus “Melissa” and within hours diagnosis scans and patches were in place to combat the virus. The computer programmer who created the Melissa virus was sentenced to 20 months in federal prison today for unleashing the virus that infected thousands of computers worldwide in 1999 and caused more than $80 million in damage. (Marti 2011) explains, In December 1999, David L. Smith, 33, of Aberdeen, New Jersey was found guilty to a state charge of computer theft and a federal charge of sending a damaged computer program. In the federal plea, Smith and federal prosecutors agreed that the damages in the case were greater than $80 million. Smith faced up to five years in prison. He was also fined $5000 by U.S. District Judge Joseph Greenaway Jr., according to a clerk in the U.S. District Court in New Jersey. (Marti 2011)There are 20 or more identified types of word Marco viruses, of them all the concept is the most common known to these viruses and is a self-replicating virus that spreads to DOC files saved with the save as command in Microsoft word file menu. If the documents are open the infected documents will spread the virus, it will also spread to the existing files that are saved by command. Word macro viruses are frequently stored in an unencrypted form and can be viewed with word. The virus can also be identified threw macro tools menu. (Prosise 2011 pg.1) Good macros viruses can serve you a lot of time if the repetitive task is completed. It is worth spending some effort to learn how to develop them. A bad macro written by someone with malicious intent, however, can be deadly. These are so called macro viruses are like Trojan horses that wait for you to assists them in the mission. They are very harmless and cannot be run until they are open an infected document, they spring into life. They infect your word program first, and from that point on every document opened in word has the potential to become infected, creating a virtual epidemic. What will happen next is the hard drive is erased.
What affect they have.
The effects Marco virus have on your computer are easily passed from lab to lab, Marco scripts that reside within a word documents are often passed around behind the scenes. (SikorskI, 2011, pg. 1) Any word documents can be easily attached to an e-mail message and sent around the world. Some geeks depends on the prayer of an e-mail popping into the inbox with a subject line such as ‘I love you’ but instead the computer hard drive is damaged and their company email systems gets badly bunged up.
Stucker (2011) explained. Since most macro viruses seek to preplace the original with its malicious code. From there, the infection tags the replacements code with the same name and functions when it comes to the command it is executed which will happen when a user accesses that file. (n.d.) as we know once the macros start to embed itself among the other documents or templates. It will also make preparations to infect any files that will eventually be created. It really depends on the type of resource that will be able to access, a macro virus will damage the other areas of the operating systems, and this will occur if the infected documents are shared amongst other users and advices. (Stucker 2011) A macro virus has the ability to infect nearly any system running word processing software. Because, it, simply looks to corrupt that application opposed to that operating system. This virus has been known to attack all computers running the Mac os x, windows and other platforms that are compatible with Microsoft word. This includes graphics and sounds files such as, gif, .jpg, .mp3, etc. For example; viewing a picture will not affect your computer with a virus. The virus code must be in place such as an exe program file or a word doc file, which the computer will actually try to execute.
How to avoid Macro viruses
Support Microsoft.com (2011) states the best way to avoid a macro virus is to always run your anti-virus software that contains the latest update, and scan your system often. Support for this particular virus is already available, and can be found from a number of anti-virus companies.
Ensure your office virus protection is turned on. After the virus has been allowed to run, it will disable the virus protection in word. It is very important to make sure office macro virus protection is turned on by performing steps listed above. Macro viruses business needs within the industry opportunities for new technology in the future is that Marco viruses will have made history among most if not all computer viruses. And will be considered the fastest-spreading virus at the time of its digital rampage, such as in early 1999. Remember word will only protect if the macro virus protection in activated on. With doing this every time your computer receives the word document, containing macros, you will be offered a choice whether to enable or not. You should always know to enable macros viruses when you are not certain of their purpose of functionality.
However, (articles .com 2011.pg.1 Para 5) reads users should also be cautioned, that just because a file is named "something.rtf” it really does not mean that it is an RTF file. Users with access to a UNIX machine can verify the file type with the command such as this type of like “file something.rtf" and should get a response similar to "Rich Text Format data, version 1, ANSI".

Users limited to Windows platforms are allowed to use the Notepad program to manually inspect the file. If the file contains markup text similar to "\rtf1\ansi\ansicpg1252\uc1" can be assured that it is indeed an RTF file. Nevertheless if the file looks more like "ÐÏࡱá" then the file is a native Word and the doc file that has simply been re-named to end in ".rtf". (articles.com 2011)Microsoft Word will open a native .doc file that has been re-named .rtf without complaint, and will proceed to run the attached macro/virus if so configured. Users are cautioned to be extremely wary of documents that are named .rtf but that contain .doc contents, as such documents have a very high probability of being infected. Protecting your computer from Macro virus….
To protect your computer be sure your office macro virus protections turned on as recommended. Run the least anti-virus software, and scan often. This way you can be sure the macros in documents are safe; also it is important to remember to keep your anti-virus software up to date by installing the latest signature files for the company.
Whenever your computer begins to act odd, this may very well mean you have a virus, it is important to run the infected macro that is open. Such as Microsoft word excel, by double clicking on the appropriate icon. Check the macro views list for infected macros on your computer. (Microsoft2011) In closing the existing technologies that will be more prominent in the years, I believe IT; it will be tailoring to our every need in five years. Analytics technologies will be providing a personalized recommendation that get commuters where they need to go in the fastest time. Adaptive traffic systems will intuitively learn traveler patterns and behavior to provide more dynamic travel safety and route information to travelers that is available today. (Heimbuch2011). Since we already have apps to determine a smarter route when driving, and most companies such as, Google already work on mapping real traffic, to help along with the flow as well as reduce time. The system will always benefit form improvements. Business Intelligence solutions will be immutably tied to the fabric of business decision-making no later than 2016, according to (Gartner2011) the increasingly sophisticated technology allows users to actualize volumes of data on the fly for specifics task, assess performance, evaluate solutions and drive future marketing and sales efforts. And By 2014 marketing for BI and analytics will undergo a gradual evolution, and the metamorphosis of BI from IT owned and reports centric will be virtually complete for a large number or organizations. This is the future is technology.

References

www.microsoft.com
The protection from macro viruses
Macro Viruses
Retrieved on 4-8-11- online resource www.google.com Retrieved 0n 4-8-11
Understanding the macro viruses www.ebscohost.com Understanding macro viruses
Retrieved on 4-9-11 www.apollolibrary.com The spread of macro viruses
Retrieved on 4-9=11 www.wikipedia.com The spread of macro viruses
Retrieved 0n 4-15-11 www.pcmagazine.com Beware of the macro virus
Retrieved on 4-11-11 www.galegroup.com The effect of macro viruses
Retrieved 4-15-11

www.chrisbrogan.com
Technology in the years to come
Retrieved 4-17-11 www.treehugger.com IBM in five years
Retrieved 4-18-11 www.articlesbase.com Retrieved 4-4-11
Avoiding macro virus

Similar Documents

Premium Essay

Technology of the Future

...its most basic level, the Kindle is just a specialized portable computer….” (Strickland, 2008). Most of the components that help control the features of the Kindle (keyboard, touch, wifi, memory, etc.) are located on the circuit board and are inseparable. Power comes from a rechargeable battery that boasts many hours of battery life. All versions of the kindle, but the Fire, run a Linux-base operating system. The Kindle can hold about 1.25GB of content, which is equivalent to 1,400 books, and books can be purchased directly from the Kindle Store to your device, with a WiFi connection or you can always plug in the USB port as well. The most boasted feature of the Kindle, minus the Fire, is the reader display made by using electronic ink technology. This eliminates the problem of glare that you have with a LCD display, especially outdoors with the sunlight. Electronic ink really...

Words: 630 - Pages: 3

Free Essay

The Future of Technology

...The Future of Technology Felbert M. Meriweather ITT Technical Institute] The Future of Technology When thinking of the future a person may wonder where they may be, who they will be with and what it is they will be doing occupationally but in the back of our mind we wonder what the world’s technology will be like. Technology is not just electronically but is also things that are made in the matter of improvement like tires that don’t go flat. It is something that has changed the world significantly, giving us the opportunity to do a lot of everyday tasks better than we ever have before. Once upon a time when someone would talk about technology they would only think of basic computers, but today’s technology is considered to be more than just that. Technology has made a huge impact on the cars that we drive, the electronics that we use and it even in our hospitals. Those are just a few of the many things that technology has affected but the question now is how much more advanced can we get in technology and how will it benefit us.. In the car industry, companies have gone as far as improving the tires we use with Air Maintenance Technology (AMT). One of the major things that we as drivers worry about is our tires and their ability to hold air. Goodyear explained its recent improvements in Goodyear’s air (2011), “AMT will enable tires to remain inflated at the optimum pressure without the need for any external pumps or electronics. All components of the AMT......

Words: 812 - Pages: 4

Premium Essay

Technology and the Future

...Technology and our future Com 156 Instructor - When we think of robot, we usually think of the classic robot of R2D2 from Star Wars. Have you ever thought of a fleet of robots taking our jobs from us? The truth is that we may lose jobs to our electro-counterparts. Technology is advancing at a rapid pace; our jobs and future may be endangered by robots taking over. Some of the robotic advancements developed may sound “out of this world”, but will be reality soon. By 2013 there will be 1.2 million industrial robots working worldwide. That breaks down to be 1.2 million robots to 5,000 humans (Aquino, 2012). The future for robots will result in more advanced designs and possess more complex decision-making abilities. The main pro for a robot in the workplace is that they will not get bored or tired as a human would. Robots are currently analyzing documents, filling prescriptions, and handling other tasks once exclusively done by humans (Aquino, 2012). The result of robots assisting humans in the workplace has resulted in safer work conditions. Robots are used more in the workplace to assist humans as opposed to overtaking their jobs. Firefighting can be very dangerous work, deploying robots for tasks such as search and rescue and extinguishing fires will reduce the injury and death rate. The United States Army has developed a robot called Thermite, a firefighting robot that has proven to reduce the risk of injury and death to humans by the ability to operate remotely......

Words: 1553 - Pages: 7

Premium Essay

Future of Technology

...THE FUTURE OF TECHNOLOGY OTHER ECONOMIST BOOKS Guide to Analysing Companies Guide to Business Modelling Guide to Business Planning Guide to Economic Indicators Guide to the European Union Guide to Financial Markets Guide to Management Ideas Numbers Guide Style Guide Dictionary of Business Dictionary of Economics International Dictionary of Finance Brands and Branding Business Consulting Business Ethics Business Strategy China’s Stockmarket Globalisation Headhunters and How to Use Them Successful Mergers Wall Street Essential Director Essential Economics Essential Finance Essential Internet Essential Investment Essential Negotiation Pocket World in Figures THE FUTURE OF TECHNOLOGY THE ECONOMIST IN ASSOCIATION WITH PROFILE BOOKS LTD Published by Profile Books Ltd 3a Exmouth House, Pine Street, London ec1r 0jh Copyright © The Economist Newspaper Ltd 2005 All rights reserved. Without limiting the rights under copyright reserved above, no part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise), without the prior written permission of both the copyright owner and the publisher of this book. The greatest care has been taken in compiling this book. However, no responsibility can be accepted by the publishers or compilers for the accuracy of the information presented. Where opinion is expressed it is that of the author and does not......

Words: 128899 - Pages: 516

Free Essay

Future Technology

...[Type the company name] 2010 Information technology Business with information technology in 2020 Information Technology in the Business World Communication technology is one of the most important aspects of information technology for the people around the world. It has changed human life by making it easier for us to communicate with each other, which makes the world seem like a small village. People now communicate with each other in different ways in comparison to the past. As a result, businesses have also changed and developed using communication technology. Companies using this technology experience both benefits and disadvantages. The discussion will be limited to this area. One of the advantages is that the Internet can help companies to communicate effectively with clients. In addition, companies can use communication technology to build good relationships with their customers. Now, most companies use a website to market their products and services and provide information about their business. Moreover, most companies use virtual communication to provide or exchange information. Conversely, communication technologies have many disadvantages. The first common disadvantage experienced in companies is that employees sometimes use company computers for dubious purposes. In addition, using the Internet in the workplace for an extended period could affect the health of employees. Further, mobile phones are not secure because of digital criminals.......

Words: 1809 - Pages: 8

Free Essay

Future Technology

...Future Technology BIS/220 March 6, 2014 Posey Future Technology The purpose of this paper is to describe the effectiveness and benefits of Google Glass (Glass), and how it may impact the use and need for PC’s, tablets, and smartphones in the near future. Glass is a mini computer placed on the side of an eyeglass frame designed to be worn as glasses and fits customer's lifestyles offering different colors, frame shapes, shades, and earbuds. Glass's frames fit with or without prescription glasses. Glass can also be bought with up to 16 GBs of internal storage with the ability of Google cloud synchronizing. Glass looks like a pair of glasses, but can perform similar tasks as a smartphone, tablet, and PC, hands free and ten times faster, so using Glass increases daily production for businesses and personal use (Glass, 2014). Responding to clients, family members, or friends is easier and quicker with Glass, because its applications are in the form of “cards” and tasks are performed through voice commands. This eliminates the need to search for emails and messages like one would search for on a smartphone, tablet, or PC, and respond with one voice command while doing other activities. Glass’s ability to sync with Google calendar and Apple's iCal also make it convenient to view and schedule appointments and reminders throughout the day (Glass, 2014). Glass, 2014, in addition, through voice command, Glass provides navigation and traffic times for any destination, with......

Words: 471 - Pages: 2

Premium Essay

Future Technology

...Through the time technology has been innovating the way of mobile communications Touchscreens made phones more intuitive than ever, and the next generation of screens promises to revolutionize our habits yet again. Several companies are working on the first phones with flexible screens, expected to hit the shops by late 2012. The innovation inside these bendy screens is OLEDs (Organic Light Emitting Diodes) - thin films of organic molecules that produce light when you run an electric current through them. Often less than a millimeter thick and offering a bright, crisp image with low power consumption, it’s not just flexibility that makes OLEDs a popular choice.  Mobile phone business is one of the most rapid growing industries. Not so long ago, the popular check phone was Nokia 3310 with mere basic functions: call, text messaging and the only bearable game, snake. However, significant improvement has been made since then. We now have so many variety of phones that surpasses the basic function, smart phones for example allows you to connect to social media conveniently, GPS, video conferencing etc Flexible bracelet The Philips Fluid Smartphone designed by Brazilian designer Dinard da Mata looks like one of those "Slap Wrap" slap bracelets kids used to wear in the 90s. Flexibility is one thing that makes it differ from conventional smart phones. Made of OLED, it can keep all the features of a smart phone available while adding the extra advantage of turning into a......

Words: 587 - Pages: 3

Premium Essay

Technology and the Future

...Employee Information Technology Satisfaction Employee satisfaction pertaining to Information Technology (IT) services is dependant on the degree to which employees feel the IT system is user friendly, while also being able to effectively complete the task at hand (Sun,2012). Additionally, IT employee satisfaction can be defined as the emotions or reaction experienced that determine the value an individual designated to a particular IT service (Sun,2012). In order to assess the level of satisfaction employees are having with IT services, it all begins with communication and collecting the various data required to make the best decisions. Most in healthcare management positions must dedicate their attention to delivering services (Sun,2012). However, management must also have a grasp on what the user or employee opinions are associated with the IT services they use daily. One effective means to beginning the process is meeting in groups. These gatherings bring together employees and leadership to formulate the best way to gather satisfaction feedback. Once the feedback data is collected, the results can shed light on what user needs are being met and which areas may need altered for increasing satisfaction. Surveys perhaps stand as the most common methods to polling IT satisfaction ratings among employees (toolpack.com). Surveys come in numerous forms such as professional standardized or customized and the in house or home grown variety. Organizations may......

Words: 346 - Pages: 2

Premium Essay

Technology of the Future

...The technological device I chose was the iPhone. The first iPhone was release in 2007, and it was like many regular smartphones, you could talk on it, watch videos, listen to music, surf the Web and send and receive email, send and receive text messages. As the years went on Apple released newer iPhone models, with more features such as the ability to take pictures and videos, use GPS, and view maps and satellite. The newer models, starting in 2009, had more storage space and used a new operating system: iOS, a modified version of the Macintosh OS X operating system used on Apple desktops and laptop computers (Wilson, Chandler, Fenlon, & Johnson, 2013). With iOS 5 you could the use iMessage and Twitter. In 2011, Apple released the iPhone 4s, with the faster A5 processor and a much improved camera that shoots 8 megapixel images and 1080p high definition video (Wilson, Chandler, Fenlon, & Johnson, 2013). This model also came with the first voice activated personal assistant, Siri. On September 20, 2013, Apple released the iPhone 5s. This phone had all of the features that the previous iPhones had but came with an A7 64 bit chip and had enhanced security with the fingerprint identity sensor. The iPhone 5c was also released, it a less expensive version of the 5s. There is already talk of the iPhone 6 coming out sometime in 2014. Rumors are flying that the iPhone 6 could be a lighter phone with a larger screen with a curved or flexible display. If you can......

Words: 436 - Pages: 2

Premium Essay

Future Technology

...David Siders Problem Solving Unit 1Assignment 1 Solar power has been used by many cultures and creatures throughout history, only in recent years have we begun utilizing it as an alternative energy source. Solar power is harnessed through “photovoltaics, solarthermal energy, and artificial photosynthesis”.{1} Using these technologies , we develop different applications such as” solar-panels” {2a} and/or” heaters, power stations”{2b}, and” thermal radiation collectors.”{2c} Harnessing solar power requires a photovoltaic system, consisting of the solar array(the panels, the visible photovoltaic system) and the balance of system ( solar inverter, mounting, cabling, and accessories for setup) Sizes and different system capacaties range from small rooftop-mounted or systems integrated into buildings(ranging froms tens of kilowatts) to larger more industrial scales with capacaties of hundreds of megawatts. “A rooftop system recoups the invested energy for its manufacturing and installation within 0.7 to 2 years and produces about 95 percent of net clean renewable energy over a 30-year service lifetime”{3} Given the decreasing cost for photovoltaic systems, in 20 years time, they could be applied forn use from your home to work and in between! Solar thermal energy is harnessed through temperature-absoorbing collectors, classified by US EIA by low, medium and high temperature ratings. Low-temp. collectors are “usually for swimming pools.” {4a}Medium temperature......

Words: 374 - Pages: 2

Free Essay

Harnessing Technology for the Future

...fossil fuels are limited, and continued reliance on them may have significant environmental consequences. Fortunately, there are alternatives. The most powerful one is right over our heads. We are bathed in the clean, virtually inexhaustible energy of the sun. Each hour, enough sunlight reaches Earth to meet the world’s energy needs for a year. To harvest this bounty, we need technology that efficiently converts the sun’s energy into forms we can use. Developing this technology is the purpose of the U.S. Department of Energy (DOE) Solar Energy Technologies Program. Powerful Goals, Powerful Technologies The Solar Energy Technologies Program is part of the DOE Office of Energy Efficiency and Renewable Energy. The Program’s mission is to improve U.S. security, environmental quality, and economic prosperity through public-private partnerships that bring reliable and affordable solar energy technologies to the marketplace. It supports research and development on a wide range of photovoltaic (PV) and solar thermal technologies that convert sunlight into useful energy. Photovoltaic Technologies The majority of the Program’s budget is allocated to PV research and development (R&D). All PV devices convert sunlight directly into electricity. However, there is a variety of materials and processes for creating PV devices, each with its own benefits and drawbacks. The major trade-off is between cost and sunlight-to-electricity conversion efficiency—higher efficiency......

Words: 790 - Pages: 4

Free Essay

Future Changes-Technology

...Paulla Fowler Message to Prepare for Future Challenges March 11, 2012 MBA 6006 Nayar at HCL Technologies prides himself and his office on being transparent. They encourage their employees to be responsible for their actions: Through the value portal where employees and customers collaborate together to develop new innovations. With the improved use the of Blue Print portal for the main managers peer-to-peer reviews to create new innovations. To the various forms of internal and external messaging used on a local bases to improve overall employee passion and customer satisfaction. In 2006 the CEO had recast the role of his office and transferred the responsibility for change on to his employees for many initiatives. One example is that of the value portal. The company wanted to change the relationship with their customer by enabling them to be more responsible for their partnership with the company. Nayar wanted his customers to be actively involved while also challenging his employees to go beyond their defined roles and responsibility. He accomplished this by creating a portal that could be used between customers and employees. This portal the “Value Portal” allowed customers to evaluate and rate the new ideas that HCLT employees generated. The portal was very successful and hundreds of HCLT customers join and thousands of ideas were generated with a potential savings of hundreds of millions of dollars(Nayar, V. 2010) . With this success Nayar felt his......

Words: 1265 - Pages: 6

Premium Essay

Future Technology in the Military

...Ten years ago the United States of America would have had been considered the most powerful military in the world. Unfortunately, there are terrorist’s that believe that the U.S. military is not. With the recent attack that brought down the “Twin Towers”, American people have been pondering the strength of the military as well. The U.S. military has to surpass all countries in research and development. By doing that, the U.S. will make itself the most superior military force in the world. The most devastating aspect of the battlefield is death. Recent wars have proven this but it seems as time goes by the death toll does as well. There is currently a variety of research and development underway to lower this right now. One of them is called the “Radar Scope”, which gives a soldier the ability to see through walls. DARPA expects the scope to be sent to squads conducting building searches. The device has the capability to sense movements, even breathing, through 12 inches of concrete and 50 feet further into room. This device alone will cut back on deaths with the advantage of knowing where people the door is broke down. An even more advanced version of this device is in the making. It is called the “Visi Building” and it will be able to actually see through many walls to give of location of people as well as objects. Visi Building will improve surveillance by allowing people to drive or fly by to see inside. Even though the Visi Building is years away from use...

Words: 968 - Pages: 4

Free Essay

Ethics in Future Technology

...For my final project, I wish to attempt to explore the philosophical controversies that represented by “new and emergent science”. The field of new and emergent science includes many other sub topics such as human cloning, animal cloning, nanomachines, human genome mapping, and DNA altering. I believe that a person could write many books while only scratching the surface of the philosophical debates that surround these intense issues. I believe that there are specific parts of these new sciences and technologies that a postcolonialist would have issues with – specifically people being able to choose and change the genes of their children. This kind of ability would more than likely be relegated to the rich and affluent, and would serve to further oppress the middle and lower classes who could not afford the procedure. While some of the new sciences do not have the most apparent ethical issues, others are glaringly obvious. In the field of human cloning for instance, there are the ethical questions of what rights would a clone have? Would it be considered “alright” to clone yourself just to harvest organs later on in life should some illness befall you? Or how about the ethics of changing the natural progression of your unborn child by altering their DNA in utero? In my opinion, the way to solve some of these issues would be to have a global summit in order to lay down laws and rules to govern the applications of these sciences. If the leaders of the world were......

Words: 391 - Pages: 2

Premium Essay

Technology Increases a Jobless Future

...Technology Increases a Jobless Future Current Trend #2 MISM 3301-01 Antoinette Y. Guerin 14 October 2014 Technology revolution is fast replacing human’s beings with machines in just about every sector and industry in the global economy. It has been calculated that millions of workers have been eliminated permanently from the economic process, with whole work categories and several job assignments have either disappeared, restructured or revamped. Based on statistics Global unemployment has reached an all-time high, since the great depression. The number of unemployed and underemployed human beings exceeds 500 million. Developing nations are facing increasing technological unemployment as transnational companies build your state of the art high tech production facilities, thus releasing millions of cheap labor who can no longer compete with the speed, cost efficiency, quality control achieved by automated machinery (Riftkin, 2012). Thus workers being replaced in this instance not displaced. It has been said that as we progress in this world that computers, smart phones and driverless cars will take over and eventually, we will see a large reduction in the human involvement in the workforce, all the while destroying the employment figures. While the invention and upgrades of the high demand of technology has made a huge impact on the way many businesses operate, and has had a large impact on the downsizing of some company’s mainly manufacturing business. Computers......

Words: 937 - Pages: 4