Emerging Technology In The 21st Century

Technology is all around us and part of our daily lives. We use a variety of technology from cell phones, computers, smart TVs, radio, etc, and in various fields such as healthcare, education, and productivity. Technology has transitioned from 1 year ago to even 5 years ago with advancement from 2G which launched in 1991 to 5G in 2019. WIth the everyday use of technology is the advancement of new and improved emerging technology such as blockchain, robotics, drones, quantum computing, and artificial intelligence, to name a few. While there are many new and improved emerging technology we will discuss just a few. In this research paper, Steven Bradley will discuss quantum computing as one of the most important emerging technology today. O’hamairya Powell and Mercedes Banks will define, describe, and give a summary of the effects of drones on emerging technology. Valda Norman will discuss how cybersecurity affects and/ or interferes with emerging technologies.

Drones are a new emerging technology for mega businesses such as Amazon. Amazon has partaken in this new technology for quicker delivery to customers. They held a conference in June 2019, in Las Vegas, Nevada expressing their excitement for the new delivery technic. Drones are expected to increase economic growth with job increases at an expected eighty billion dollars. Companies are continuously trying to evolve with the growing technology in this day and time. With this new technology it will help reduce the cost of employee’s wages. They don’t expect the shipping and handling charges to be changed from this new technology. There are some holdbacks because of regulations. With the mega businesses following technology innovation this also allows them to make technology affordable for consumers. Not only is Amazon participating in using drones, but also agricultures use drones to water and give their plants the necessary nutrients for large areas. This technic cuts down costs on equipment increases plant life and improves efficiency. Though this will cut out the need for certain jobs it will increase employment by an estimated 100,000.

The concern that is causing roadblocks in this industry is concerns of damaged packages, which could be from wildlife or technical difficulties. Drones can be flown remotely or by GPS in the drone. They are used heavily in the military as protection, communications with other soldiers, and even weapons sometimes. Their drones have thermal imaging included for multiple reasons. If you’ve ever been to a football game, wedding, and even a construction site you may see drones being used. The highlights or replays that you see on television during a Cowboys game are being recorded by multiple twenty-million-dollar drones. You’ll see videographers for weddings or events use drones to catch that special shot over your hometown or ceremony. Many businesses such as construction sites use drones to get a full view of the potential building or site they’ll be working on. Using that drone they may use the technology to build a blueprint to show to a potential client or business. This new technology has its pros and cons that the FFA is still trying to regulate for the protection of consumers and businesses. Though there are still concerns with businesses such as Amazon using drones, this UAV has emerged tremendously in the military and agriculture world.

With the rise of new technology heading into the 21st century comes the threat of security in gaining access or restricting operations. Some of the most common threats in security include malware, phishing, SQL attack, etc. In the next few sentences, I will define the common types of threats to security. “What is malware, refers to any program installed on a computer that performs harmful actions. Malware may steal personal information, encrypt files for ransom, or perform any number of other criminal acts. Common types of malware include viruses, Trojans, worms, rootkits, and ransomware” (Biscontini, 2019). Malware can be thought of as a type of virus. Phishing is defined as “the act of using various communication devices such as e-mail and telephones in an attempt to trick individuals into either revealing their personal information, including passwords and social security numbers or installing malicious software (malware)” (Cooper, 2019). SQL (Structured Query Language) “is an interactive programming language that allows users to find and change information in databases” (Mohn, 2019). As you can guess this type of attack by hackers will add, modify, or even delete records in a database. I believe that this type of threat to security is a silent one that most do not see coming. There are many other types of security threats like denial of service, man-in-the middle (also known as eavesdropping attack), password attacks, the list can go on and on. I have mentioned some of the maj

Our Advantages

Quality Work

Unlimited Revisions

Affordable Pricing

24/7 Support

Fast Delivery

Order Now

Custom Written Papers at a bargain