The Topics that were covered this week were Hardware and Computer Forensics. These two topics play into how my product works, as well as how it functions with the user. The INTERSECT will incorporate both of these topics during every single use in order to provide a better experience for those who use it.
Hardware will directly be incorporated in how the INTERSECT functions. There will obviously be various parts within the tablet which make it run. The tablet that would be Ideal for the INTERSECT system/program would be an IPad. I may need to get an agreement from Apple to let me use their product in coalition with the INTERSECT. This would be will be well worth it because the IPad’s design and interior specifications are ideal for a user oriented interface. The performance that the display, motherboard, memory, processor, and communication system provide will be extremely important to how the INTERSECT program will work. All of these parts will work together in order to allow users to check directions from the specific intersection they are at to a certain building. It will also all users to check in to the intersection that they are at to inform others of their location.
The topic of Computer Forensics will also play into my product. People who use the INTERSECT will not have to worry about identity theft while using the product. This is because people never have to give away MAJOR personal information such as social security number, credit card information, or bank account numbers. This will allow users to Enjoy their experience without having to worry about who has access to their important information… because nobody will. The only information that will be stored on the hardrive of the program is users name, gender, age, time used, and directions searched for. This all ties into the last post regarding privacy. As we learn more things in class, I get a better understanding of how exactly the INTERSECT will be run and work.