Tablets Take Their Place in the Pc Market
Essay by Tom • January 18, 2013 • Research Paper • 1,655 Words (7 Pages) • 2,276 Views
Abstract
The purpose of this paper to answer the questions purposed in writing assignment 4. The first question involves computers using AI techniques and whether or not teachers are needed for some subjects? The second question involves End-user systems and can complex and complicated user friendly systems be developed? The third question involves security issues involved with making payments through tablet PCs? Then finally the fourth question involves offshore outsourcing for software development. These questions are based on the Case Study: "Tablets Take Their Place in the PC Market" (Haag & Cummings, 2013).
The purpose of this paper is to discuss tablet PCs and their use and systems development process. Part one will include the use of tablets in the classroom as a learning aid and the role that teachers may play in the future. Part two will cover end-user systems and making them user friendly or "idiot proof" so that people can use them without training or intervention. Part three will include what security issues are involved with making payments with tablet PCs and whether people would be comfortable entering their credit card information into restaurant-supplied technology. The final topic of this paper will focus on offshore outsourcing for software development and the expectations of other countries developing software for use in the United States.
In the classroom environment for a child using a tablet PC to learn the basics of any subject the technology involved should be of a design that engages the learner. This technology can consist of any reliable technique or method such as cognitive learning strategies and critical thinking skills. This does not mean that teachers are no longer needed for some subjects. The teacher's primary role is to help students understand a particular subject matter. Everything else is secondary. Therefore, the focus of any computer-related development should not be on the technology itself, but on how computers can improve performance in the core areas (Burns, n.d.). Successful technology-based learning relies heavily on a context for use; classroom teachers play a significant role in facilitating student learning and aligning educational technology with content from complementary sources (How Does Technology Facilitate Learning?, n.d.). In order to learn, students should teach the computer or use the technology to represent what they know rather than memorizing what teachers and textbooks tell them. Technologies provide rich and flexible media for representing what students know and what they are learning. At the same time, learning is not a guaranteed outcome. Lack of purpose in the design of instructional content and the strategies employed to present that content in a technology-based environment can cause programs to fail (Marshall, 2002). While the teacher is very important in the earlier grades where students are still learning how to learn computer-based training or CBT's has become the norm for training later in life and on the job where a classroom environment is just not possible.
Now that we have discussed the role of tablet PC's in a learning environment we can now discuss end-user systems in the business environment. As anyone who own a smart phone or tablet PC knows most available apps are "idiot proof" or usable without training. End-user systems, like those that allow patrons to order meals on an iPad or other tablet PC's already exist and are in use today at many restaurants. The ability for customers to have hands-on control of their order is a growing trend the idea behind it is not to replace someone, but to give guests the hands-on experience, to interact with the menu (The New Age of Dining Out, n.d.). Customers can now even place their orders through iPhone applications even before arriving making it more convenient for both the customer and restaurant employees. It eliminates the step of having to answer the phone and take an order. These battery-operated devices also allow for customers to split the bill, pay via credit card, and e-mail a receipt to themselves right at the table. So why use a paper menu when you could be offering your guests a brand name Apple product that they already know and love as their own digital menu also allowing customers to play games while waiting for their food and keep track of the progress of their order (Digital Menu Software, n.d.).
Even though these new tablet PC's and smart phones are fun and easy to use they do come with a risk. To compete with the big guys, small and mid-sized merchants are pursuing innovative ways to save money including accepting payments via smartphone or tablet computer instead of investing in expensive traditional registers. However, the convenience of using a portable register comes at a cost. Smartphones and tablet PCs are not built to be secure holders of credit card data. So it's up to merchants to make sure customers' information is secure. Advances in technology have also addressed security concerns, as some restaurants have developed a system allowing customers to have their credit cards swiped in front of them. So does this payment process make it easier for someone to steal your credit card information? The quick answer is that it's really not safe to connect to an unknown open wireless network particularly if you're going to be transferring any kind of sensitive information (Heet, n.d.). The reason is that any and all information sent over an unsecured wireless network is information that is sent in plain sight, so to speak, for anyone to grab over the air. Just by connecting to an open network you are potentially opening your computer to anyone else on that wireless network. Yet not all small merchants are serious enough about data safety. One reason for this apathy, according to the survey, is that merchants are "frustrated and overwhelmed ... by comprehending and applying compliance measures" (Heet, n.d.). Many small merchants also believe they are at a low risk for security breaches. With an increasing number of these small businesses eager to adopt mobile payment technology, this attitude could be dangerous.
Finally we come to the topic of offshore outsourcing and its use in software development. There are many factors involved when it comes to using offshore outsourcing. One such factor is data security and protection. IT organizations should evaluate any kind of outsourcing question as to whether vendors have sufficiently robust security practices and if vendors can meet the security requirements they have internally. While most IT organizations find offshore vendor security practices impressive
...
...