Skip to main content

Computers are changing the way we work


 The construction industry has seen many changes over the years when it comes to computer technology. The man I call dad has been in the construction industry since before I was born but it is not until recent years that he has needed to learn how to use a computer for work. The industry has used things like blueprints to erect structures from the ground up. Now they are using iPads & tablets on the construction site to guide them while they build these structures. There isn’t a need to use physical blueprints anymore since they can be accessed from a mobile device and with this mobile device many more features can be added. The construction industry can and has benefitted from the information technology industry. The devices they use in the construction industry need to be secure to carry information to the job site and workers there. The devices need to be secure to make sure the information or the device is not compromised. The devices used in the construction industry can use a cloud-based system to access everything they need whenever they need from anywhere, they have access to the internet. All these and more technological advancements will require both industries to continue to have workers that can adapt to these advancements. In the future, I am sure there will be more use of augmented reality for the construction industry so that the people out in the field can build more efficiently. Having these new changes is going to require new devices with new software. With these new devices, there will be a need to get these devices suited for the job. There is mutual benefit for both industries to continue to work together in the years to come to keep the world moving forward.

Comments

Popular posts from this blog

  Network Security Connection             Network security is very important in today’s world, and it will continue to be an essential part of the future of the cyber world. With each new technological advancement, there is a threat that arises that is set in motion to try and exploit that new technology. From the dawn of the first home computers, some seek to use those same systems with malicious intent. Cybercrime is the fastest-growing form of criminal activity (Vahid & Lysecky, 2017). The growing rate of cybercrime means there must be people at the forefront trying to protect against it and it starts with protecting networks as well as devices that are in use. Network security is a cornerstone to any computer database and this security needs to stay prepared for any cyber threat that will try to take advantage of its users.            Having a reliable network requir...
Information Highway  Sending and receiving information on the internet does have its snags at times and having ways to help determine what causes them can help make that information travel better. I have used ping and traceroute extensively due to my line of work. I work for an internet service provider and running ping tests can come in handy when a customer is experiencing slow internet speeds. When you run a ping test to a certain destination you are sending packets to that place and awaiting a response. This can help determine if the line of communication to that destination is a clear one and if there isn’t a clear route for that packet it can be lost. If the packet of information doesn’t make it to its destination it could be resent causing a slight delay to that information. Traceroute is used to see the number of places a packet must hit before reaching its destination. Each server it hits is marked down along with the amount of time it took to reach that server. I did a ...
 Network Security      There are several security threats to those that jump on any network even when it isn’t connected to the internet. The number of computing devices out there can all be targeted and if these threats are not checked the damage can be very costly. The threats to one’s network, devices, and even information come in many forms. These threats are serious but there are a few tried and true methods to help avert them. This paper will cover two specific threats in detail as well as outline some protective measures to help.            One of the threats that are very popular in the cyberworld is called phishing. Phishing is a scam that runs on the internet to try to exploit a user’s sensitive information (Vahid & Lysecky, 2017). These types of threats are mainly targeted at a specific user of a device that can connect to a network or internet. Once a breach has happened the user’s information can be...