Generative verses Tethered

Generative


 * Something that grows and can produce an offspring
 * It gives rise to other things, constantly growing and expanding

Generative Technology (such as the Apple II) are products where the users can build off of with unanticipated change. These programs invite people to tinker with it. It encourages users to make the technology tailored to their personal usage. Put simply, a box that users can alter and tinker with and essentially make it work for them

In psychology, one of Erik Erikson's psychological stages of development is "generativity vs Stagnation." This refers to the developmental stages for old people if they live a life of learning new things actively or just live out their life until they die essentially. So when you think of Generative, you can think of the life pattern of an active old person as opposed to Stagnation which is easier to remember.

He acknowledges that generative devices have problems such as viruses, spam security breaches and phishing schemes. These all pose a security threat to various users. One major problem in generative devices is bad code, whether it is intentional or an accidental. Also, early internet was self-contained, meaning you could only access through a given network (such as AOL).
 * Dilemmas

Tethered (sterile)


 * Does not have the ability to grow
 * Some one has set limits/guidelines/boundaries
 * There is one person (a company) controlling the content

Tethered Technology (such as the iPhone) are products that do not invite innovation but come preprogrammed. You are not allowed to add your own applications or programs. Another example is the iBrick, the term used to describe a tinkered-with iPhone which has been rendered inactive by Apple. Today the iPhone is still seen as a tethered device because users must buy all applications through the Apple website and not a third party provider. As of March 2008 though, Apple allowed other developers outside of Apple to create applications, but they still must go through Apple.

Features of tethered devices


 * Tethered devices contain a secure system or perception of a secure system, they are structured by the company, and users can hold a company accountable if something is to go wrong with their device.


 * Return to Final Exam Review Questions