Editor's Note: Technology's Reach Is Limitless - InformationWeek
IoT
IoT
Software // Enterprise Applications
Commentary
1/21/2005
08:33 PM
Stephanie Stahl
Stephanie Stahl
Commentary
50%
50%

Editor's Note: Technology's Reach Is Limitless

In a matter of years, more computer intelligence will be embedded in places that we never imagined (or maybe we've imagined it, but it's years from reality): household devices, highways, even the human body.

Many years from now, when I have grandchildren, I'll likely be telling stories about the "old days" when we actually had to turn on the lights using a light switch or start cars using keys or push buttons on a microwave to heat something up or put paper documents in mailboxes in front of our houses. They'll probably laugh and think, "How old-fashioned!" In a matter of years, more computer intelligence will be embedded in places that we never imagined (or maybe we've imagined it, but it's years from reality): household devices, highways, even the human body.

Of course, there's already plenty of intelligence around us in our daily lives, including voice-activated GPS systems, car engines, home-security systems, medical and surgical devices, and other things we don't necessarily think of as computer technology. Already the lines are blurring between consumer electronics and the home computer. Intel is working on a concept that lets consumers play games, record TV shows, and check E-mail, all thanks to a single chip. Bill Gates contends that "we're only beginning to realize computing's potential. I believe that we're entering an era when software will fundamentally transform almost everything we do."

Indeed, software is being embedded in places to improve security, eliminate human surveillance, track inventory, and more. In "Sensors Everywhere", senior writer Aaron Ricadela explores how wireless sensor-network technology is at the frontier of computer networking research.

Projects are under way to use these devices to secure U.S. borders, monitor oil-refinery equipment, track warehouse goods, monitor hazardous materials, and detect earthquakes. Today, the possibilities seem limitless.

Stephanie Stahl, Editor-in-chief sstahl@cmp.com


To discuss this column with other readers, please visit Stephanie Stahl's forum on the Listening Post.

To find out more about Stephanie Stahl, please visit her page on the Listening Post.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll