Discuss about the Information and Communication Technologies Development.
Internet of things is one of the next-generation technologies. It mainly consists of all devices that have been connected via the internet. In the year 2014, it was predicted that by the time we reach 2020, there will be over twenty-five billion devices connected to the internet of things (Bennett, 2015). These devices are the ones we use every day and are internet-enabled, or they could be devices that can only be used while connected in a networked environment. Internet of things just like any technology does not come without problems.
Internet of things brings with it as many disadvantages as it does bring advantages. We are talking about billions of connected devices that means that there are as many interconnects. With all these devices connected, the most significant challenge that arises is how to manage these devices while ensuring privacy given the fact of the existing connections. Confidentiality of data, files, information, and users including their data is always a concern (Singer J, 2002). People share their data over the internet; names, emails, credit/debit card numbers, socio security numbers among other confidential info. Now, the question is, with all these shared data and the billion interconnections, how do we ensure that sensitive data does not fall into the wrong hands?
In the year 2014, it was predicted that by the time we reach 2020, there will be over twenty-five billion devices connected to the internet of things. These devices are the ones we use every day and are internet-enabled, or they could be devices that can only be used while connected in a networked environment. Internet of things just like any technology does not come without problems. It raises concerns like:
Naming problems can be resolved by use of Dynamic Naming System – DNS, Devices that need to be connected to the internet will have unique IP addresses assigned to them.
Internet of things just like any technology does not come without problems. It raises concerns like:
Naming problems can be resolved by use of Dynamic Naming System – DNS, Devices that need to be connected to the internet will have unique IP addresses assigned to them. From my vantage point, there’s no reason not to utilize the admired Domain Name System (DNS), which is similarly also suited to naming fridges as it is Linux servers. Using DNS implies not creating another namespace for naming gadgets or making new conventions to determine those names, and we can depend on years of industry experience and aptitude.
Communication between servers and client is provided by TCP/IP model. The client does not need to communicate to other clients as they are not offering any service. A typical model now expects gadgets to be customers that depend on the producer’s cloud-based servers to work. For instance, my Internet-empowered indoor regulator and the application on my telephone that controls it didn’t convey specifically, shared. Instead, each discusses autonomously with the cloud and meet there.
This invokes the question of privacy of these devices and their users. Each machine that works in each market and division can be associated with the Internet. How would we track these gadgets, guaranteeing these billions of “things” are up? What will be best practices for observing for seizes or blackouts? There are likewise protection issues around following and checking that will probably rule the discourse as these innovations multiply.
We as a whole realize that unmaintained PCs have all way of stuff onto the Internet, and the vast majority of those have a working framework that is kept up by somebody. Interestingly, numerous IoT merchants have officially left the business, and their gadgets may well be loaded with bugs that no one will ever have the capacity to settle. What does that do to the Internet’s ability to manage malevolent performing artists? Furthermore, by what method will execution and enhancement issues over the Internet be distinguished and settled in such a vigorous and quick evolving condition?
Major stakeholders in the field of the internet of things have already come up with set standards of how the internet of things will be operated and managed. For instance, Devices connected to the internet are named by use of an IP address which is unique to any single device that is connected to the internet (Tatnall, 2017).
When it comes to solutions I would want to recommend on; I will use the issue of privacy. Internet providers, governing bodies and technology innovators have mostly taken care of confidentiality while coming up with their software and systems. However, the users ignore these standards and end up exposing themselves to potential privacy violations (BLOOMBERG, 2017). For instance, while using Gmail and on receiving mail, Gmail has provided a mechanism where all the attachments are scanned for possible malwares. Contrary, some users just download the attachments without scanning them and end up being privacy violation victims.
Without imagination, our ability to see things as they might be and just as they are at a given moment cannot happen. Einstein’s quotes “Imagination is more important than knowledge. Knowledge is limited. Imagination encircles the world”. For us to improve our imaginations, we must be very creative, and for us to be creative, we need to be open to the world of possibilities. All these we can do if we change how we perceive things. We should be free to everything, old, new, true, false and even factious things. To improve our perception of things we need to increase our knowledge. This can happen in many ways even without much efforts; reading a blog, a novel, watching a video, seated somewhere making observations, carrying out experiments among many other things.
While conducting my research about the issues that surround the internet of things, I have increased my knowledge. I now know that the internet of things is already happening by us being able to connect to the internet every day as we go about our daily business. For instance, a learner in the US will comfortably receive help through video conferencing by an expert in the field who is in Japan (Panda, 2017). Video calling can be done via Google Hangout or even Skype. While doing the research, I can now imagine how business meetings can be conducted by a company’s board members while everyone is miles away from each other – all by use of teleconferencing technologies.
The process of learning is continuous. I have been able to learn the issues that revolve around the internet of things. During my research, I have seen how system users make themselves vulnerable to attacks and hacks which would have otherwise been avoided. For instance, leaving your accounts logged in while you were using cyber services (Nayak, 2017). The next customer who comes has access to all your details even without struggles.
I have learned recommended practices when it comes to the use of internet of things. For instance, Use of unique and a different password all together for your online sites. Logging out after you are done with an account, scanning any attachments sent via email before downloading them to my PC, making sure your PC has antivirus software and that they are up to date, etc.
References
Anokwa, Y., Hartung, C., Lerer, A., DeRenzi, B., & Borriello, G. (2009). A new generation of open source data collection tools. 2009 International Conference On Information And Communication Technologies And Development (ICTD). https://dx.doi.org/10.1109/ictd.2009.5426732
Bennett, S. (January 01, 2015). The Internet of Things. Transport Topics.
BLOOMBERG, J. (2017). 7 Reasons Why the Internet of Things Is Doomed. WIRED. Retrieved 18 August 2017, from https://www.wired.com/insights/2014/07/7-reasonsinternet-things-doomed/
Cheung, H., Elkhodr, M., & Shahrestani, S. (January 01, 2017). Internet of Things Applications.
Cybersecurity Risk Management Focus In Hitrust Catalogue. (n.d.). Retrieved from https://healthitsecurity.com/news/cybersecurity-risk-management-focus-in-hitrust
Davison, R. Ethics and research methods. Proceedings Of The 35Th Annual Hawaii International Conference On System Sciences. https://dx.doi.org/10.1109/hicss.2002.994382
Nayak, P. (January 01, 2017). Internet of Things Services, Applications, Issues, and Challenges.
Organisation for Economic Co-operation and Development. (January 01, 2016). The Internet of Things: Seizing the Benefits and Addressing the Challenges.
Panda, S. (January 01, 2017). Security Issues and Challenges in Internet of Things.
Singer, J., & Vinson, N. (2002). Ethical issues in empirical studies of software engineering. IEEE Transactions On Software Engineering, 28(12), 1171-1180. https://dx.doi.org/10.1109/tse.2002.1158289
Tatnall, A., & Davey, B. (January 01, 2017). The Internet of Things and Beyond.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download