According to the Shelly Frost (2014), technology has limitations and downfalls that can negatively impact business. As everyone know, not all the technology devices are perfect and without the blemish. Wireless technologies present unique security challenges due in part to the relatively immaturity of the technology and incomplete security standard. This has raise up the concerns of people beginning to grow about just how safe the security of technology it is. The poor security and the privacy information in a computerized program leave an opening for hackers to access their personal information. Hacker is someone who seeks and exploits weakness in a computer system or computer network for personal gain. This information may be used for malicious purposes that could bring serious consequence to the victims. Besides that, advanced technology requires specific skill and knowledgeable to handle it as a result limitation exists based on how to train the huge people using the technology. Some of the computing technologies require complex programming to run the work, the employee need to know about computers or internet well.. There are challenge task to develop analytical and specific skill of such huge labor to confident using the machine in order to boast the productivity. User error is common potential problem for the employee to create wrong data and ruined the technology devices due to lack of the train on the program. Thus, complex programming technologies have reduced the dependency of people on
According to the Shelly Frost (2014), technology has limitations and downfalls that can negatively impact business. As everyone know, not all the technology devices are perfect and without the blemish. Wireless technologies present unique security challenges due in part to the relatively immaturity of the technology and incomplete security standard. This has raise up the concerns of people beginning to grow about just how safe the security of technology it is. The poor security and the privacy information in a computerized program leave an opening for hackers to access their personal information. Hacker is someone who seeks and exploits weakness in a computer system or computer network for personal gain. This information may be used for malicious purposes that could bring serious consequence to the victims. Besides that, advanced technology requires specific skill and knowledgeable to handle it as a result limitation exists based on how to train the huge people using the technology. Some of the computing technologies require complex programming to run the work, the employee need to know about computers or internet well.. There are challenge task to develop analytical and specific skill of such huge labor to confident using the machine in order to boast the productivity. User error is common potential problem for the employee to create wrong data and ruined the technology devices due to lack of the train on the program. Thus, complex programming technologies have reduced the dependency of people on