The term emerging technology has been frequently used
by Information Technology professionals and academics. However, little research has shed light on this term and specified its characteristics and what it means. Therefore this Seminar aims at defining and giving the characteristics of Emerging Technologies. The characteristics are uncertainty, network effect, unseen social and ethical concerns, cost, Limitation to particular countries, and a lack of investigation and research. Several examples of Emerging technologies are given to validate these characteristics. ACKNOWLEDGEMENT SPECIAL THANKS TO God Almighty for his Mercy, Grace, love and protection all through my academic year. My Sincere gratitude goes to my Ever loving and Caring parents Mr.& Mrs. B UDEAJA for sending me to school, and their moral Upbringing and in spite of the economic situation of the country, they find a way to make provision for the success of my Academic life. To my lovely siblings, Judith, chizzy, emmanuella and Joshua, I want to say I love you all for ever. To my loved ones, UDEAJA AUSTEN, my besties ANNIE, CREAMY MZ BOBO and all my numerous friends and colleagues that contributed positively, I thank you all for all your support and encouragement towards my academic work, I say may God Almighty bring their good desires true and also increase their days. CHAPTER ONE
INTRODUCTION TO EMERGING TECHNOLOGY
There is no widely agreed- upon definition of emerging
technologies, as different persons have defined emerging technologies in different ways.
SCHOEMAKER (2000) AND SRINIVASAN (2008)
defined emerging technology as science based innovations with the potential to create a new industry or transform an existing one. They Identified the DVD Market and the record label companies as an example, they were destroyed as a result of the emerging Apple store and the IPod.
The BUSINESS DICTIONARY also defined Emerging
Technologies as technologies that are currently developing or will be developed over the next five to ten years and will substantially alter the business and social environment (www.business dictionary.com)
DANIEL ET ALS (1998) Viewed Emerging technology
as something that is commercially available but not common or something that could become commercially available within the next five years. This definition implies that technology does not need to be new to be considered an Emerging Technology (vine 2000). Rather, technology is considered Emerging if it is not widely available in the market and used by people. The business Dictionary Definition of Emerging technologies specified that technology is considered emerging for the first 5 to 10 years of its life cycle, whereas (stahl2011) states that technology considered emerging for the first 10 to 15 years. This is another misconception about specifying a range of time in a technologys lifecycle to determine if a technology is emerging.
To sum up, Emerging technologies are not necessary
new. Technology is labeled as emerging in a particular content,(domain, place or application) but can be established elsewhere. Technology can also be considered Emerging when it is not widely spread in a particular content. Emerging technology has no limited or fixed life. Technology is defined as Emerging when it causes a radical change to business, industry or the society at large. BLUETOOTH WIRELESS TECHNOLOGY
This seminar provides an overview of Bluetooth wireless
technology and also give to little instruction on how to establish Bluetooth connections using Device, Bluetooth wireless technology is 90 in expensive stout range radio technology that eliminates the need for proprietary cabling between devices such as mobile phones, Notebook PCS, personal digital assistants (PDA.S) cameras, and also printers. Bluetooth technologies can be used at homes, in the office, in the car etc.
CHAPTER 2
HISTORY OF BLUETOOTH WIRELESS
TECHNOLOGY
Bluetooth wireless technology was developed in 1994
at Ericson in Sweden. The original purpose of Bluetooth was to eliminate the need for cable connections between devices. Although infrared communication existed at that time, but it be required line of sight contact. Therefore Ericson choose to use an inexpensive, low power radio built into each device making it possible to wirelessly connect devices through walls and other non-meteoric materials. After Ericson began work on Bluetooth, the concept blossomed into a radio technology that simultaneously connect several devices in a wireless personal Area Network. (WPAN)
Because of the Unlimited potential of Bluetooth, the
Bluetooth special interest Group (SIG) was formed in 1998 to develop the Bluetooth specification 1EEE 802.15. The specification standardized the development of Bluetooth enabled devices so that devices from different Manufacturers can work together.This means that, with Bluetooth, one can run a presentation on a clients Bluetooth enabled projector without a cable connection, Exchange electronic business cards with everyone in the room, regardless of where they are sitting.
CHAPTER THREE
WORK HOW BLUETOOTH WIRELESS
TECHNOLOGY
The Bluetooth clip can operate between the
frequency bands of 2400- 2483.5MHZ. Bluetooth is designed to be fully functional in areas that wireless communication such as infrared ports could not function.
In order to achieve this communication, the main clip
operates with frequency hopping and thus does not need a clear path between two devices. The Bluetooth network can link up to eight devices. This connection is referred to as piconet. The idea between these connections is like that of masters and slaves. Where the soft wire sends a page from the master to the slaves and the slave then listens for its devices access code, if there is a match, then connection is established. The software aspect of Bluetooth is the main controller of the communication. This also plays an Important role regarding security issues. Once the connection is established, than a NULL packet is set from the master to the slave and the master must wait for the slave to respond. At this point the link manager protocol (LMP) takes over, The LMP is comprised of mandatory protocol Data units and these are transferred between devices through a single packet, When a connection is requested, the requesting device must send LMP host connection request. The requested device can respond with either LMP accepted or not accepted. Once the linkage is complete, LMP setup complete is sent and packets or data are transmitted.
BLUETOOTH COMPATIBLE DEVICES
There are over 10000 products that are Bluetooth enabled, some of the categories consists of mobile phones, personal computers headsets and printers, These components are every essential in the future as they are being used every day, some classified mobile phone can connect or communicate various products as washer and dryers and automobiles. All of the products which have Bluetooth may not have proper profile and link to establish a connection. However as the technology progresses, more profiles can be utilized and the virtual gaps will be bridged.
BLUETOOTH SECURITY
Bluetooth security is complex, yet it is mostly
transparent and easy for user to implement, Bluetooth uses three types of security mechanism: Authentication, Authorization and Encryption. Authentication verifies the identity of the Bluetooth device trying to connect with your device, after Authentication is complete, your Bluetooth device grants (authorizes) another Bluetooth device access to a specific service. Encryption translates data into a format that can be read by only another device with the same encryption key.
The Implementation of these mechanisms Occurs at 3
levels (modes of security):
MODE1: No security anyone can use this device, This
mode is the default setting for public devices such as printers MODE 2: In this mode, permission to access your device is dependent on the service(s) you authorize (service level security). With your PDA, for example you can allow another device to exchange electronic business cards and delay the device access to contact information and calendar entries. MODE 3: In this mode, the device must be paired before they can establish a connection and transfer data (link level security). There are several concerns within Bluetooth security as some have proven that the link between two devices can be easily intercepted once major Concern is the use of the PIN to generate the link between two devices. This pin could be as short as 4 digits, leaving a possibility of thousands of combination. CONCLUSION Bluetooth seems to be growing in the industry of electronic every day. All major electronic companies are looking to Bluetooth as the form of wireless communication. However, there are still security issues that must be addressed and looked at in fine details, Bluetooth is creative, innovative and is outlook for a prosperous future in technology.