The question we must
study, if the network computers and thin clients may substitute the personal
computer, cannot be answered in an absolute way but is depended from the user’s
needs. More specifically, probably teenagers have different needs than a professional
in banking or insurance sector. Therefore, we should analyze the strengths and weaknesses
of each solution. So, we have to make a research on it and after that we can
get a view on the subject.
gives us the benefits to easily share resources, to exchange data between the clients
from the central server and users to updated the newest versions of the
applications. Furthermore, all users can be updated between them with decreased
the probability to have communication lag or misleading information and they
earned time and money. However, If the server stops running or the network
presents a problem, the data stops being shared, and the user must communicate
with the person who is responsible for the server maintenance. Moreover, this
means that all clients are depended to this person. If a user is naive and can
easily become a hacker’s target, it may become dangerous for the users who share
across the network and the central server.
Thin Clients are low-
cost computing device which are managed by a central server and are not easily
accessible and vulnerable to attacks and use less power.
intended for individual use. This type
of computer, is designed for use by only one person and there is no needed any
communication with other systems or users. Each of those users probably have
their own needs and they also have the ability to design the applications and
programs they are needed. Probably Personal Computers have high initial cost and
are costly also for the updates.
I suppose that the
answer of the initial question for the future of personal computer is a
combination of the classic – old school – personal computer with the services and
advantages which offered a network solution. In my opinion, “home”users will
continue to buy a personal computer for their individual usage, with their
individual needs and application but they will have the choice to be connected
to a network or cloud only for specific purposes as exchange information or to
use a specific program with some limitations (time or versions). User could
choose how deep will be this connectivity with other users or to the central server.
Thin clients could not substitute the personal Computers in this connectivity
because are not a complete solution.
The data of Fortune magazine are collected via a questionnaire
survey that is answered by randomly selected employees of companies. Fortune magazine
preidentified some factors which probably effect to the people selection for
which company they prefer to work. The results of these questions generate the
dataset with categorial variables. Also, the results are the source of an
Index, the “Trust Index” which measure this argument. Each question has a
selection scale of min to max or lower to more because the Surveys results
should be measurable(quantitative). The questions have varied subjects or
targets, for example some are for the Company’s environment, the Colleagues
relationship or the motivation skills of the leaders of the Company. Variables
as the average salary, total number of Full Time employees, the percentage rate
of women at a Company, sector of Economy etc.
By analyzing the data which collected from the Questionnaire,
we can identify which factor the employees believe is more important for their
choice and for which company they want to be a part of. On the other side, If
Employers study this data will improve themselves and their companies and they
could have more efficient, productive and satisfied employees.
Wrong results and low ranking probably to denigrate a
company. Also, wrong results the Fortune magazine could lose the trust from its
readers and accuracy of the “Trust Index”.
common RFID uses electromagnetic fields to automatically identify and track
tags (or smart labels) attached to objects using radio waves. RFID systems divided
by 3 parts, an RFID tag or smart label, an RFID reader, and an antenna. RFID
tags used a silicon microchip to store a unique serial number and some other
information. RFID includes two types of systems. The passive and the active. The
differences between these two types, passives do not include transmitter and
just take power source from the reader’s antenna. Active include a transmitter and
take power source usually from sun. Passive RFID tags usually tags at items in
a store which needed to track the movement. Active RFID tags often at
Containers or other big assets which needed to be tracked from long distance,
at checkpoint control. RFID antennas collect the waves which sent from RFIF
RFID technology will
have many effect at the retail market. If the RFID tags replace the classic
Barcodes is possible to collect data of the Items movement in the store and the
BI team if analyze this information will identified which place in the store is
more productive. The replenishment procedure would be easily and less timing,
because when a product moved from a shelf, a sign would send to a Warehouse.
The Classic POS would improve to an intangible procedure with online payments
probably with a mobile app. Stocktake procedure could be easily and fastest with
hand antennas which could count the stock.
The companies can
provide information and to ensure that their products are in the place they
should be. To be able to say that this has a positive effect, it should there
are fewer products that are discarded and not consumed. In this way employers
control both products and people as employees.
Voice or speech recognition at simple
words is the ability of a machine or program to receive and recognize human linguistics
instructions and execute specific commands.
Your speech provides vibrations in the air. A
digital converter (ADC) translate those vibrations to digital data. This data is
recognized only by the computer. The machine/program filter this sounds and
remove unwanted voices. Also, adjust the volume of the sound so the final
translated voice is clear and at a normal level. People speak to a different
levels and volumes. So, the program edit and then match this speech to a predefined
template sound samples that are already in the system. After that the Voice Recognition
application take the