Professional Documents
Culture Documents
Inhibiting?
https://pixabay.com/illustrations/icons-buttons-logos-structure-489550/
The Philippines has similarly experiencing upward trend in the use of Information and Communications Technology in its
industries. E-commerce enable people to advertise and sell goods online. Various multimedia platforms are assisting the
Department of Educations in its mandate. Advancing Telecommunication Companies has made an avenue for Filipinos to
collaborate with the world in improving the people’s quality of life. ICT is a necessary tool for mankind in finally reaching full
potential within the larger framework of sustainable development and human rights.
Let us reflect on how Information and Communications Technology enhances, emancipates, empowers and even
enslaves every individual. It supplies learning activities for students to organize and even mobilize an event that deals with a global
issue. With this ability, it can fast track the delivery of social goods and services. It can boost the economy at the same time,
sustaining the natural resources of planet Earth.
Globalization have accelerated the delivery of products, technology, information, and jobs across the continents. Its
remarkable pace has been driven by communications technology innovations and public policy changes. Hence, globalization can
be described as an economic,
Dimensions of Technology
A. Computing
Computing uses computer technology in structuring, processing and managing any kind information to complete a given
goal-oriented task such as scientific studies, intelligent systems and multimedia.
Enabling Features Inhibiting Features
1. Broadband Technology enable a high-quality internet >Expensive/costly ownership, maintenance of security,
connectivity. upgrades, compatibility of hardware and software and
accessory devices inhibiting orders and purchases
>High-speed internet access of 1Gbps enable to support 10 + > Low-speed internet access of 10 Mbps can support only 1-2
devices used by businesses & some homes to extreme high devices to surf the web, send e-mails and with moderate high
definition real-time streaming and frequent and huge file definition streaming
transfers
In public cloud, it is open enabling the sharing of Busnisses storing sensitive information or data should
information. Hence, there is low security. It is hard to use private cloud to inhibit hacks and breaches.
prevent loss of data.
> Data management implements policies and procedures that
3. Datafication pertain to the collective tools, technologies and provides data control inhibiting risks and cost of regulatory
processes enabling an orgaization to transform into a data- noncompliance, legal problems and security breaches (hacks)
driven enterprise
> Big Data Analysis gather and analyze large-scale data sets,
enabling it for administrative or commercial use
> It can propose solutions or take actions instantly inhibiting
4. Smart System Technology is a new generation of human intervention ones in progress.
computing systems and information architecture combined Home systems can automatically turn off the lights,
with modern technologies like artificial intelligence, machine close the garage, lock doors and adjust to
learning and internet of things enabling the convergence of temperatures
physical and virtual worlds and enabling adaptability to varying
demands and conditions.
Tarlac City in Region 3 shared its initiative to become
Central Luzon’s first “smart city” to develop the “Angel
Portal Ecosystem Project” enabling citizen
registration application system and online
transactions. A “smart campus” could also be
developed to facilitate distance learning.
B. Communications
Enabling Features Inhibiting Features
> Accelerated Mobile Pages (AMP) enabling webpages to load > AMP removes all of the dynamic features that slow down
instantly. Consumers prefers this, so when it takes more than websites inhibiting some applications or functions that
three seconds to load, consumers will abandon the site. generate leads and conversions like Javascript.
> Most likely that your brand will drive traffic away to your own
website to the accelerated pages, causing you to essentially
compete with your own brand. It will inhibit your website’s
domain authority in predicting how well your website ranks on
the search engine result pages.
C. Content
It is where the relevance of technology lies.
Enabling Features Inhibiting Features
> It is integrated into the delivery of traditional services such e- > The Concept of Information Overload and Internet Addiction
learning, e-business and e-employment. which could inhibit attention, sound decision making, sound
selection of information, efficient management of time and also
> It enables the deployment of goals like literacy, poverty job satisfaction.
reduction and sustainable development.
> Enterprise Administrator URL Blocklist which inhibit
> It enables constant sharing, comments, votes and reviews browsing/ internet access of listed website to protect
that gives better way of producing quality of goods. organization from viruses and malicious content.
D. Human Capacity
Enabling Features Inhibiting Features
> Human capacity enable technology to function well and > Variety of languages that can inhibit understanding and
manage its safety and security. operation of a technology
> Human Capacity enable the acquisition neccesary skills and > Human’s Computer Literacy, Digital Dependency,
knowledge Information Overload, Gaming Disorder, Gambling Disorder,
Attention Deficit Disorder
> Human capacity can create strong passwords/security labels > Human is capable of initiating data center vulnerability, data
that can protect the information being relayed. breach, hacks, cybercrime
Benefits of Technology
The demand of IT professional like Computer Programming, System Analyst, Network System Administrator, Computer
Software and Hardware Engineering, Web Application Design creates new job opportunities
Within the field of Science and Technology, employment is expanding which includes Laboratory Technologist,
Laboratory Analyst, Environmental Science Technicians, Medical Scientist, Forensic Science Technicians, Industrial
Engineering Technicians , Avionics and Aircraft Equipment Mechanics
Technologies were built from good intentions. The purpose of each technology swiftly drives it forward. Now, with new
upgrades, existing technologies continually create something better.
Employment of people at the remotest of areas to do bite-sized computer-based task like translating text to different
languages
Employees can work from home, or even at their most comfortable places and convenient time
Some tratements and intercations between the patient and medical professionals is projected to use virtual reality
Airports implements augmented-reality guides to address customers’ need quickly and efficiently
Retail and cosmetics use augmented reality for testing beauty products.
4. Business Innovations
Modern Technologies have assisted various companies inorder to formulate innovation strategies and provide incentive
to its clients. The inability to innovate and rise above competition can cause major losses or compromising the safety and security
resulting into bankruptcy.
Some examples of innovations from known companies:
Amazon Custom allows vendors to sell products via Amazon that could be customized. Amazon launched the Beta
version of Amazon Custom allowing existing customers to provide feedback directly. In turn, Amazon can refine their
disruptive new product incrementally and continously. Most importantly, the company retained the element of speed which
can lower development costs, greater forecasting accuracy, and the chance to secure a greater market share.
Philip Morris International innovates via self-disruption strategy. Despite being the world’s largest tobacco company, the
company launched more than 3, 400 patents for new technology that will potentially provide healthier alternatives to
cigarettes.
Samsungis harnessing the power of the ‘creative elite’ . When new products are released, the company utilizes customer
feedback to inform their TRIZ problem solving methodology to pinpoint gaps in the market where innovation efforts could
be made. The ‘creative elite’ works with its partner, the Russiian Academy of Science to help develop an array of
products, ranging from new LED bulbs to 3D technology.
Nestle is powering agile ideation with startups. The industry used Qmarkets innovation software to launch the ‘InGenius”
global innovation accelerator in 2014 and Henri@Nestle Project in 2016. This collaborative projects accepts proposal from
creative start-up companies and offer stakeholder sponsorhips and funding towards bringing their vision to life.
Ford Motor Company is accelerating innovation with crowdsourcing methods to foster ideation on multiple fronts. It uses
its ‘Idea Space’ innovation accelerator powered by Qmarket Innovation Management Software.The company works on the
Intersection Priority Management System utilizing hybrid wireless connections to enable vehicles share trajectory data.
There will be safe movements through intersections without having to stop.
Social networking sites have been accepting advertisement from different type of business. As observed, it is an effective
and powerful marketing tools. Influential customers share to massive audiences about which products and services to
avail and which ones to avoid.
The Human-end Point is prone to cybersecurity vulnerabilities creating the weakest link in the information security chain.
The negligence among employees for security practices is the biggest threat to an endpoint security of consumer internet, telecom,
cloud services, e-commerce and even healthcare industries.
Manual data entry is the weak link in automated systems. The data entry errors are costly to companies. Cyber criminals
can demand ransom by encrypting the data and files, malign the public image, blackmail, and disrupts services.
The ability of the customer service department to timely rectify an experience gone wrong is usually the weakest link in
most growing entrepreneurial companies.
Define company’s culture for employees, consider proposals and suggestions from employees. A powerful motivator
comes when people know how their contributions made a difference and feel they’re important.
Establish good management, executing business strategy while dealing with any obstacles that arises within the
operation.
Effective marketing, being on social media and using the same platform with customers and prospects.
Effective marketing, being on social media and using the same platform with customers and prospects.
Deliver what is on the promise, assist customer to deal with any miscue and material defects.
Keep up with the updates and figure out which technology is appropriate for the business.
Customers control today’s conversations. Influential customers share to massive audiences about which products and
services to avail and which ones to avoid.
Learning Activities
How did Alibaba (from the story Alibaba and the Forty Thieves)
open the cave?
Activity 2
A. Direction: Write EF when the statement implies an enabling feature or IF when the statement implies and inhibiting feature.
Write your final answer on the space provided.
_____1. The Fiber Broadband transmit internet signal for 40 km wide.
_____2. A High-speed internet access of 1Gbps supports 10 devices.
_____3. Human digital dependency was observed.
_____4. The constant sharing, comments, votes and reviews produces quality of goods.
_____5. The computer uses variety of languages.
_____6. The deployment of goals like literacy, poverty reduction and sustainable development.
_____7. Accelerated Mobile Pages load webpages instantly.
_____8. 5G network connects different devices.
_____9. Public Cloud is open.
_____10. Having Enterprise Administrator URL Blocklist protects an organization.
Activity 3
Direction: Write 2 examples of each concept below. Write your final answer on the arrows.
1. Social Networking Sites
2. New Jobs in ICT
3. Workforce Transformations
5. Business Innovations
Activity 4
Direction: Direction: Answer the following question. Write your final answer above the given question in each hat figure.
2. Who can resolve the
1.Where is the weakest link?
weakest link?
Activity 5
Direction: Fill in the blanks with the correct word or phrase to complete the thought of the sentence.