In the third section of the novel Total Recall, authors Gordon Bell and Jim Gemmell, explain ‘The Future’, discussing the transition towards the use of new technology. These final chapters discuss the constant issues with total recall, however, once we adapt to these problems there’s nothing but positives.
Our adaptation to technology refers more to the fact of are we willing rather than are we capable. This is simply, because of how e-memory is meant to be accessed at ease. However, if an individual isn’t willing to adapt, change and move with technology then this creates a problem, not with technology itself, but with that individual. For example, data loss and decay, this is when a computer crashes and as a result we lose data. Even though this may seem as a negative, depending on the last time you back that file up your e-memory will recover the data as far as then. Furthermore, the three main stages of adaptation include, self-knowledge, recording and court. Adapting to self-knowledge is vital for us to accept the concept of total recall. Self-knowledge, refers to information about an individual. With this being said, we prefer information that happened in the past to stay in the past. However, the importance of adapting to self-knowledge is the fact that it is here to help as opposed to cause harm. Moreover, the idea of having to adapt to our information being potentially used in court is a daunting prospect. This is because, of how anything we’ve previously mentioned can easily be picked up. However, this forces us to be more careful and appropriate on the web.
This section discusses how to experience more of the revolution sooner. First thing to note is that although their main goal to have total recall, they also want the future to be one where we essentially use less paper. With this being said, they included a basic equipment’s that enable us to experience this concept earlier. These include: smartphones, GPS, digital camera, personal computer, internet connection, and a scanner. All these devices are essential towards not only total recall but also reduction of the use of paper. For example, the importance of a scanner is that it can help digitize anything we have on paper. Also with the help of optical character recognition (OCR) it can pick up specific texts that we want.
Step two discusses lifelogging, this refers to the process of capturing moments to add to your e-memories. For example, using your digital camera to capture moments worth remembering. Furthermore, this part also discusses the importance of health logging. The process behind logging your health is simple as all you have to do is created a document of all the key statistics about your health. Additionally, it not only encourages you to get involved in various activities it also acts as a warning of potential illnesses/ diseases.
The book essentially concludes with a section about the future. Here the authors discussed their aims on total recall on the future. With this being said, they envision a future where, Total Recall will become a private matter as opposed to public, where encryptions will be universal and e-memories will reside in Swiss banks. However, if e-memory becomes more of public matter, through social media such as Facebook and Twitter. This will essentially turn lifelogging into life-blogging, enabling detailed records of our lives, including our location and biometrics, effectively exposing our every move for the world to see.
Finally, with the idea of total recall fully explained, we can better analyze the various social and ethical issues involved in this new revolution. A major social issue involved with this concept is privacy. Privacy is an issue which arises from the fact that we are recorded/ recording. Now, once we upload our recordings to be saved in a file, we are never certain who else has access to our files, thus breaching our privacy. Essentially raising another question about the reliability and integrity of the product. This is because, if the technology fails to explain in their policies where their online files fail are going. Then how can an individual trust that certain IT system? Furthermore, another apparent issue being cultural diversity. This is because, as people gain control of more advanced IT systems to better obtain their e-memories they lose touch of their origins. Moreover, assuming an individual’s private e-memories gets hacked. Thus, raising the ethical questions who is responsible/ accountable for? Now assuming, that it came down to an individuals carelessness with their privacy, for example, discussing their password to their files to a third party, then they are responsible and accountable for their details being exposed. However, if it came down to the producers product obtaining a lack of security, then they’re at fault.
Arts Nd Entertainment (9)
Case Study (5)
Delicious Links (212)
Intellectual Property (12)
IT Systems (29)
Just for Fun (36)
People and Machines (42)
Policues and Standards (13)
Politics and Government (13)
Presentation No Show (7)
Science Nd Environment (8)
Web 2.0 (12)
A blog to help ITGS students become independent and creative ICT thinkers - Please be polite with comments. Any criticisms of the weblog and its working please send me a mature comment and I will rectify it as soon as possible. REMEMBER TO NOT USE YOUR FIRST NAME OR LEAVE YOUR EMAIL ADDRESS IN YOUR COMMENTS - BLOG SAFELY!