You are on page 1of 9

Technology: Enabling or

Inhibiting?

Trends, Networks, and Critical Thinking in the 21st


Century 11/12
First Semester, Quarter 2, Week 3

https://pixabay.com/illustrations/icons-buttons-logos-structure-489550/

AILEEN MARIE O. SAN LUIS


Developer

Department of Education • Atok National High School

What I Need to Know


Welcome to the great journey into the minds and aspirations of the world today.

The Philippines has similarly experiencing upward trend in the use of Information and Communications Technology in its
industries. E-commerce enable people to advertise and sell goods online. Various multimedia platforms are assisting the
Department of Educations in its mandate. Advancing Telecommunication Companies has made an avenue for Filipinos to
collaborate with the world in improving the people’s quality of life. ICT is a necessary tool for mankind in finally reaching full
potential within the larger framework of sustainable development and human rights.

Let us reflect on how Information and Communications Technology enhances, emancipates, empowers and even
enslaves every individual. It supplies learning activities for students to organize and even mobilize an event that deals with a global
issue. With this ability, it can fast track the delivery of social goods and services. It can boost the economy at the same time,
sustaining the natural resources of planet Earth.

Dear students, let us enjoy this learning experience.


Learning Objectives:

a. Identify the dimensions of technology that are enabling and inhibiting


b. Discuss the benefits of technology
c. Explain the weakest link in a system using strategic and intuitive thinking

Globalization have accelerated the delivery of products, technology, information, and jobs across the continents. Its
remarkable pace has been driven by communications technology innovations and public policy changes. Hence, globalization can
be described as an economic,

Dimensions of Technology

A. Computing

Computing uses computer technology in structuring, processing and managing any kind information to complete a given
goal-oriented task such as scientific studies, intelligent systems and multimedia.
Enabling Features Inhibiting Features
1. Broadband Technology enable a high-quality internet >Expensive/costly ownership, maintenance of security,
connectivity. upgrades, compatibility of hardware and software and
accessory devices inhibiting orders and purchases

>High-speed internet access of 1Gbps enable to support 10 + > Low-speed internet access of 10 Mbps can support only 1-2
devices used by businesses & some homes to extreme high devices to surf the web, send e-mails and with moderate high
definition real-time streaming and frequent and huge file definition streaming
transfers

> Fiber Broadband network enables the transmission of


internet signals for 40 km wide

2. Cloud Computing enable connections of large pool of


systems to analyze quantities of data.

 In public cloud, it is open enabling the sharing of  Busnisses storing sensitive information or data should
information. Hence, there is low security. It is hard to use private cloud to inhibit hacks and breaches.
prevent loss of data.
> Data management implements policies and procedures that
3. Datafication pertain to the collective tools, technologies and provides data control inhibiting risks and cost of regulatory
processes enabling an orgaization to transform into a data- noncompliance, legal problems and security breaches (hacks)
driven enterprise
> Big Data Analysis gather and analyze large-scale data sets,
enabling it for administrative or commercial use
> It can propose solutions or take actions instantly inhibiting
4. Smart System Technology is a new generation of human intervention ones in progress.
computing systems and information architecture combined  Home systems can automatically turn off the lights,
with modern technologies like artificial intelligence, machine close the garage, lock doors and adjust to
learning and internet of things enabling the convergence of temperatures
physical and virtual worlds and enabling adaptability to varying
demands and conditions.
 Tarlac City in Region 3 shared its initiative to become
Central Luzon’s first “smart city” to develop the “Angel
Portal Ecosystem Project” enabling citizen
registration application system and online
transactions. A “smart campus” could also be
developed to facilitate distance learning.

B. Communications
Enabling Features Inhibiting Features

Mobile devices are the primary mode of internet access for


many users.

> Accelerated Mobile Pages (AMP) enabling webpages to load > AMP removes all of the dynamic features that slow down
instantly. Consumers prefers this, so when it takes more than websites inhibiting some applications or functions that
three seconds to load, consumers will abandon the site. generate leads and conversions like Javascript.

> Most likely that your brand will drive traffic away to your own
website to the accelerated pages, causing you to essentially
compete with your own brand. It will inhibit your website’s
domain authority in predicting how well your website ranks on
the search engine result pages.

> Cybernetics pertains to the science of control systems and


communication systems as well as all forms of information
> Conversational commerce use Facebook Messenger, processing between living organisms and machine. It has an
Whatsapp, and WeChat enabling customers to get exactly automatic controller to adjusts or inhibits the systems’
what they want. behavior accordingly. Some of the legislations includes the
Anti-Cyberbullying Act of 2015 Cybercrime Prevention Act of
2012 and International Telecommunication Unions

> 5G Network enables machine to machine communication as


well as the interconnection of devices from door locks to cars
to refrigerators. It can download an ultra HD movie in seconds
and solve network congestion and bandwidth problems

> Google Assistant announced support to India’s native


languages enabling more users for a technology

C. Content
It is where the relevance of technology lies.
Enabling Features Inhibiting Features
> It is integrated into the delivery of traditional services such e- > The Concept of Information Overload and Internet Addiction
learning, e-business and e-employment. which could inhibit attention, sound decision making, sound
selection of information, efficient management of time and also
> It enables the deployment of goals like literacy, poverty job satisfaction.
reduction and sustainable development.
> Enterprise Administrator URL Blocklist which inhibit
> It enables constant sharing, comments, votes and reviews browsing/ internet access of listed website to protect
that gives better way of producing quality of goods. organization from viruses and malicious content.

> Bad intentions and purposes of computer-related projects


> Good intentions and purposes of computer-related projects dominated the system
motivate the constituents of the system.

D. Human Capacity
Enabling Features Inhibiting Features
> Human capacity enable technology to function well and > Variety of languages that can inhibit understanding and
manage its safety and security. operation of a technology

> Human Capacity enable the acquisition neccesary skills and > Human’s Computer Literacy, Digital Dependency,
knowledge Information Overload, Gaming Disorder, Gambling Disorder,
Attention Deficit Disorder

> Human capacity can create strong passwords/security labels > Human is capable of initiating data center vulnerability, data
that can protect the information being relayed. breach, hacks, cybercrime

Benefits of Technology

1. Creating of new jobs

 The demand of IT professional like Computer Programming, System Analyst, Network System Administrator, Computer
Software and Hardware Engineering, Web Application Design creates new job opportunities
 Within the field of Science and Technology, employment is expanding which includes Laboratory Technologist,
Laboratory Analyst, Environmental Science Technicians, Medical Scientist, Forensic Science Technicians, Industrial
Engineering Technicians , Avionics and Aircraft Equipment Mechanics

2. Emerging new services and industries

Technologies were built from good intentions. The purpose of each technology swiftly drives it forward. Now, with new
upgrades, existing technologies continually create something better.

 Artificial Intelligence Technology predicts patterns useful for human


 Artificial Intelligence Technology shows the probability of a patient’s recovery
 Artificial Intelligence Face Face Recognition technology find those missing people or criminals who were reported
 Smart Machines initiate changes and solutions to basic problems
 Automated Platforms that can process customer interactions and needs quickly
 Biometrics can authenticate person in an institution
 Robotics used for delicate situations beyond human capacity or conditions that human needed help
 5G Network make smart cities possible
 Vehicles that can repair itself

3. Transformations in the workforce

 Employment of people at the remotest of areas to do bite-sized computer-based task like translating text to different
languages
 Employees can work from home, or even at their most comfortable places and convenient time
 Some tratements and intercations between the patient and medical professionals is projected to use virtual reality
 Airports implements augmented-reality guides to address customers’ need quickly and efficiently
 Retail and cosmetics use augmented reality for testing beauty products.

4. Business Innovations

Modern Technologies have assisted various companies inorder to formulate innovation strategies and provide incentive
to its clients. The inability to innovate and rise above competition can cause major losses or compromising the safety and security
resulting into bankruptcy.
Some examples of innovations from known companies:

 Amazon Custom allows vendors to sell products via Amazon that could be customized. Amazon launched the Beta
version of Amazon Custom allowing existing customers to provide feedback directly. In turn, Amazon can refine their
disruptive new product incrementally and continously. Most importantly, the company retained the element of speed which
can lower development costs, greater forecasting accuracy, and the chance to secure a greater market share.

 Philip Morris International innovates via self-disruption strategy. Despite being the world’s largest tobacco company, the
company launched more than 3, 400 patents for new technology that will potentially provide healthier alternatives to
cigarettes.

 Samsungis harnessing the power of the ‘creative elite’ . When new products are released, the company utilizes customer
feedback to inform their TRIZ problem solving methodology to pinpoint gaps in the market where innovation efforts could
be made. The ‘creative elite’ works with its partner, the Russiian Academy of Science to help develop an array of
products, ranging from new LED bulbs to 3D technology.

 Nestle is powering agile ideation with startups. The industry used Qmarkets innovation software to launch the ‘InGenius”
global innovation accelerator in 2014 and Henri@Nestle Project in 2016. This collaborative projects accepts proposal from
creative start-up companies and offer stakeholder sponsorhips and funding towards bringing their vision to life.

 Ford Motor Company is accelerating innovation with crowdsourcing methods to foster ideation on multiple fronts. It uses
its ‘Idea Space’ innovation accelerator powered by Qmarket Innovation Management Software.The company works on the
Intersection Priority Management System utilizing hybrid wireless connections to enable vehicles share trajectory data.
There will be safe movements through intersections without having to stop.

 Social networking sites have been accepting advertisement from different type of business. As observed, it is an effective
and powerful marketing tools. Influential customers share to massive audiences about which products and services to
avail and which ones to avoid.

Addressing the Weakest Link

The Human-end Point is prone to cybersecurity vulnerabilities creating the weakest link in the information security chain.
The negligence among employees for security practices is the biggest threat to an endpoint security of consumer internet, telecom,
cloud services, e-commerce and even healthcare industries.
Manual data entry is the weak link in automated systems. The data entry errors are costly to companies. Cyber criminals
can demand ransom by encrypting the data and files, malign the public image, blackmail, and disrupts services.
The ability of the customer service department to timely rectify an experience gone wrong is usually the weakest link in
most growing entrepreneurial companies.

 Define company’s culture for employees, consider proposals and suggestions from employees. A powerful motivator
comes when people know how their contributions made a difference and feel they’re important.
 Establish good management, executing business strategy while dealing with any obstacles that arises within the
operation.
 Effective marketing, being on social media and using the same platform with customers and prospects.
 Effective marketing, being on social media and using the same platform with customers and prospects.
 Deliver what is on the promise, assist customer to deal with any miscue and material defects.
 Keep up with the updates and figure out which technology is appropriate for the business.
 Customers control today’s conversations. Influential customers share to massive audiences about which products and
services to avail and which ones to avoid.

Learning Activities

Activity 1: Picture Analysis


Direction: Answer the questions:

How did Alibaba (from the story Alibaba and the Forty Thieves)
open the cave?

How can you open/access your e-mail/facebook/messenger/twitter/Instagram account?

Activity 2
A. Direction: Write EF when the statement implies an enabling feature or IF when the statement implies and inhibiting feature.
Write your final answer on the space provided.
_____1. The Fiber Broadband transmit internet signal for 40 km wide.
_____2. A High-speed internet access of 1Gbps supports 10 devices.
_____3. Human digital dependency was observed.
_____4. The constant sharing, comments, votes and reviews produces quality of goods.
_____5. The computer uses variety of languages.
_____6. The deployment of goals like literacy, poverty reduction and sustainable development.
_____7. Accelerated Mobile Pages load webpages instantly.
_____8. 5G network connects different devices.
_____9. Public Cloud is open.
_____10. Having Enterprise Administrator URL Blocklist protects an organization.

Activity 3
Direction: Write 2 examples of each concept below. Write your final answer on the arrows.
1. Social Networking Sites
2. New Jobs in ICT

3. Workforce Transformations

4. New Services and Industries with the emergence of ICT

5. Business Innovations

Activity 4
Direction: Direction: Answer the following question. Write your final answer above the given question in each hat figure.
2. Who can resolve the
1.Where is the weakest link?
weakest link?

4. What can prevent the


3. Why will the weakest link
formation of the weakest link?
form within the system?

Activity 5
Direction: Fill in the blanks with the correct word or phrase to complete the thought of the sentence.

Technology has its ______________________________ and ______________________________ aspects.

You might also like