0% found this document useful (0 votes)
10 views

Re-Compiled Intro To Emerging Technologies

Uploaded by

kaffe
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Re-Compiled Intro To Emerging Technologies

Uploaded by

kaffe
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 49

NG University

Chapter One:
1. Introduction to Emerging Technologies
1.1. What is emerging technologies?
- Emerging technology can have different when used in different areas, such as media,
business, science, or education.
- But emerging technology can be defined as :
o It is a term used to describe a new technology
o It refers to the continuing development of existing technology.
o It refers to technologies that are currently developing, or that are expected to be
available within the next five to ten years
o It is usually reserved for technologies that are creating or are expected to create
significant social or economic effects.
1.2. Evolution of Technologies
- Technological evolution is a theory of radical transformation of society through
technological development.
 What is the root word of technology and evolution?

i. Technology:
o It is originated from Greek word “tecknologia”
–meaning systematic treatment of an art, craft, or technique.
o Basically, technology if from “techno” and “logy” meaning “science of the
mechanical and industrial”
ii. Evolution:
o It is the process of developing by gradual changes.
o It is derived from the Latin word “ evolution", meaning an unrolling or opening
1.3. some currently available emerged technologies
- Currently the available technologies may include but not limited to:
o Artificial Intelligence (AI)
o Augmented Reality and Virtual Reality
o Cloud Computing
o Angular and React
o Internet of Things (IoT)
o Intelligent Apps (I-Apps)
o Big Data

Prepared by Kafale .A (MSc) Introduction to Emerging Technologies


-1-
NG University

o Robotic Processor Automation (RPA)

1.4. Introduction to the Industrial Revolution (IR)


- IR was a period of major industrialization and innovation that took place during the late
1700s and early 1800s.
- IT occurs when a society shifts from using tools to make products to use new sources of
energy, such as coal, to power machines in factories.
- IT was started in England, with a series of innovations to make labor more efficient and
productive.
- This time was a time when:
o The manufacturing of goods moved from small shops and homes to large factories.
o Changes in culture as people moved from rural areas to big cities in order to work.
- The A m e r i c a n IR commonly referred t o a s t h e S e c o n d Industrial Revolution, started
sometime between 1820 and 1870.
- The impact of changing the way items was manufactured had a wide reach. Industries
such as :
o textile manufacturing, o glass making
o mining, o Agriculture all had undergone
changes
1.5. The Most Important Inventions of the Industrial Revolution
- The most important inventions of IR may include but not limited to:
o Transportation: The Steam Engine, The Railroad, The Diesel Engine, The Airplane
o Communication: Telegraph, Transatlantic Cable, Phonograph, Telephone.
o Industry: The Cotton Gin, The Sewing Machine, Electric Lights
1.6. Historical Background of (IR 1.0, IR 2.0, IR 3.0,IR 4.0)
- The industrial revolution began in Great Britain in the late 1770s and then spreading to the
rest of Europe.
- The first European countries to be industrialized after England were:
o Belgium o France o German
- The four types of industries are:
i. The primary industry involves getting raw materials e.g. mining, farming, and fishing.
ii. The secondary industry involves manufacturing e.g. making cars and steel.

Prepared by Kafale .A (MSc) Introduction to Emerging Technologies


-2-
NG University

iii. Tertiary industries provide a service e.g. teaching and nursing.


iv. The quaternary industry involves research and development industries e.g. IT.

a) The first Industrial Revolution (IR 1.0)….1760s

- It was described as a transition to new manufacturing processes.


- The transitions in the first IR included going from:
o hand production methods to machines
o the increasing use of steam power

b) The Second Industrial Revolution IR 2.0 …..1870s.


- The Second IR, also known as the Technological Revolution.
- The advancements in IR 2.0 included the development of:
o Telegraph
o Railroad networks and etc

c) The third Industrial Revolution( IR 3.0)……1950s

- It was introduced the transition from mechanical and analog electronic technology to
digital electronics
- The core factor of this revolution is the mass production and widespread use of digital logic
circuits and its derived technologies such as:
o computer,
o Hand phones
o Internet

Prepared by Kafale .A (MSc) Introduction to Emerging Technologies


-3-
NG University

d) The Fourth Industrial Revolution( IR 4.0)……1950s


- The fourth Industrial Revolution works with different technologies such as:
o Robotics technologies
o , Internet of Things (IoT) technologies
- The technologies mentioned above are what you call – cyber- physical systems.
- A cyber-physical system is a mechanism that is controlled or monitored by computer-based
algorithms, tightly integrated with the Internet and its users.
- It is the adoption of Artificial Intelligence (AI)
- AI is also one of the main elements that give life to Autonomous Vehicles and Automated
Robots

1.7. Role of Data for Emerging Technologies


- Data is regarded as the new oil and strategic asset since we are living in the age of big data,
and drives.
- It determines the future of:
o Science
o Technology
o the economy
o possibly everything in our world today and tomorrow
1.8. Enabling devices and network (Programmable devices)
- In the world of digital electronic systems, there are four basic kinds of devices.
These are:
i. Memory devices iii. Logic devices and
ii. Microprocessors devices iv. Networks

Prepared by Kafale .A (MSc) Introduction to Emerging Technologies


-4-
NG University

I) Memory devices: used to s t o r e random information.


Example: RAM, ROM, catch Memory
II) Microprocessors: are used to execute software instructions to perform a wide variety of tasks
Example: CPU
III) Logic devices provide specific functions, including:

Prepared by Kafale .A (MSc) Introduction to Emerging Technologies


-5-
 device-to-device interfacing  data display
 data communication  timing and
 signal processing  control operation
IV) The network: it is a collection of computers, servers, mainframes, network devices,
peripherals, or other devices connected to one another to allow the sharing of data.
Examples of network devices:
o Modems o Conferencing equipment
o Routers o Network appliances (NIDs and SIDs)
o Switches o Hosting equipment and servers
1.9. Why is a computer referred to as a programmable device?
- Computer is considered as a programmable device because it follows a set of
instructions to perform tasks.

1.10. Human to Machine Interaction


- This refers to the communication and interaction between a human and a machine
via a user interface.
1.11. What is interaction in human-computer interaction (HCI)?
- As its name implies, HCI consists of three parts:
o the user
o the computer itself, and
o the ways they work together.
- Therefore, HCI is the study of how people interact with computers and to what extent
computers are or are not developed for successful interaction with human beings.
- The goal of HCI is:
o To improve the interaction between users and computers
o Simplicity, ease of deployment & operations and
o Cost savings for smaller set-ups.
o Reduce solution design time and integration complexity.
1.12. Some Basic Disciplines Contributing to Human-Computer Interaction (HCI)

 Cognitive p s y c h o l o g y : Limitations, i n f o r m a t i o n p r o c e s s i n g , p e r f o r m a n c e
p r e d i c t i o n , cooperative working, and capabilities.
 Computer science: graphics, technology, prototyping tools, user interface management
systems.
 Linguistics.
 Engineering and design.
 Artificial intelligence.
 Human factors.
1.13. Emerging technology trends in 2019
 5G Networks
 Artificial Intelligence (AI)
 Autonomous (self-governing) Devices
 Augmented(improved) Analytics
 Digital Twins
 Enhanced Edge Computing and
 Immersive Experiences in Smart Spaces

Review Questions
1. Where did the Industrial Revolution start and why did it begin there?

2. What does “emerging” mean, emerging technologies and how are they found?

3. What makes “emerging technologies” happen and what impact will they have on

Individuals, Society, and Environment?

4. What is the reason for taking care of design a good computer-human interface?

5. Discuss the pros and cons of human-computer interaction technology?


Chapter Two:
2. Data Science
2.1. What is Data Science?
Data science is a multi-disciplinary field that uses scientific methods, processes,
algorithms, and systems to extract knowledge from:
 Structured data
 semi-structured data and
 Unstructured data.
2.2. What are data and information?
i) Data:
o Data is a representation of facts, concepts, or instructions.
o It can be described as unprocessed facts and figures.

o It is represented with the help of characters such as alphabets (A-Z, a-z), digits (0-9) or
special characters (+, -, /, *, <,>, =, etc.).
o Data can be divided into three types. These are:

a) Alphabetic data b) Numeric data & c) Alphanumeric data


a) Alphabetic data: it consists of A - Z and a-z. Sometimes called non-numeric
data.
b) Numeric data: consists of ten digits, two signs & decimal point
 Digits: 0,1,2,3,4,5,6,7,8 & 9
 Signs: + & -
 Decimal point: (.)
c) Alphanumeric data: it is used to represent alphabetic data, numeric data,
special characters and symbols.
ii) Information
o Information is the processed data on which decisions and actions are based.
o It is data that has been processed into a form that is meaningful to the recipient
o Information is interpreted data; created from organized, structured, and processed
data in a particular context
2.3. Data Processing Cycle
- Data processing is the re-structuring or re-ordering of data by people or machines to increase
their usefulness and add values for a particular purpose.
- Data processing consists of the following basic steps - input, process, and output.
Input Process Output

Input − in this step, the input data is prepared in some convenient form for processing. The form
will depend on the processing machine. For example, when electronic computers are used, the
input data can be recorded on any one of the several types of storage medium, such as hard disk,
CD, flash disk and so on.
Processing − in this step, the input data is changed to produce data in a more useful form. For
example, interest can be calculated on deposit to a bank, or a summary of sales for the month can
be calculated from the sales orders.
Output − at this stage, the result of the proceeding processing step is collected. The particular
form of the output data depends on the use of the data. For example, output data may be payroll for
employees.
2.4. Data types and their representation
- Data types can be described from diverse perspectives.
- In computer science and computer programming, for instance, a data type is simply an
attribute of data that tells the compiler or interpreter how the programmer intends to use the
data.

Example :
a) Data types from Computer programming perspective
 Almost all programming languages explicitly include the notion of data type but
different languages may use different terminology.
 Common data types include:
 Integers(int)- is used to store whole numbers, mathematically known as
integers
 Booleans(bool)- is used to represent restricted to one of two values: true or
false
 Characters(char)- is used to store a single character
 Floating-point numbers(float)- is used to store real numbers
 Alphanumeric strings(string)- used to store a combination of characters and
numbers

b) Data types from Data Analytics perspective


o From a data analytics point of view, it is important to understand that there are
three common types of data types or structures. These are:

i. Structured
ii. Semi-structured and
iii. Unstructured data types
i) Structured Data
- Structured data is data that adheres /stick or attach/ to a pre-defined data model and is
therefore straightforward to analyze.
- Structured data conforms to a tabular format with a relationship between the different rows
and columns.
- Common examples of structured data are Excel files or SQL databases. Each of these has
structured rows and columns that can be sorted.
ii) Semi-structured Data
- Semi-structured data is a form of structured data that does not conform with the formal
structure of data models associated with relational databases.
- it contains tags or other markers to separate semantic elements and enforce hierarchies of
records and fields within the data.
- it is also known as a self-describing structure.
Example: XML
iii) Unstructured Data
- Unstructured data is information that either does not have a predefined data model.
- Unstructured information is typically text-heavy but may contain data such as dates,
numbers, and facts as well.
- Common examples of unstructured data include audio, video files or No- SQL databases.
Metadata – Data about Data

- Metadata is data about data.


- It provides additional information about a specific set of data.
- Metadata could describe when and where the photos were taken.
- The metadata then provides fields for dates and locations which, by themselves, can be
considered structured data.
- Because of this reason, metadata is frequently used by Big Data solutions for initial analysis.

2.5. Data value Chain


- The Data Value Chain is introduced to describe the information flow within a big data
system
Data Data Data Data Data
Acquisition Analysis Analysis curation Usage
1) Data Acquisition
 It is the process of gathering, filtering, and cleaning data before it is put in a data
warehouse or any other storage solution on which data analysis can be carried out.

2) Data Analysis

 It is the process of exploring, transforming, and modeling data with the goal of
highlighting relevant data, synthesizing and extracting useful hidden information
with high potential from a business point of view.
 Related areas include data mining, business intelligence, and machine learning.

3) Data Curation
 It is the active management of data over its life cycle to ensure it meets the
necessary data quality requirements for its effective usage.
 Data curation processes can be categorized into different activities such as
o content creation o transformation
o selection o validation and
o classification o Preservation.
4) Data Storage
 It is the persistence and management of data in a scalable way that satisfies
the needs of applications that require fast access to the data.
 Relational Database Management Systems (RDBMS) have been the main, and
almost unique, a solution to the storage paradigm for nearly 40 years.

5) Data Usage
 It covers the data-driven business activities that need access to data, its analysis,
and the tools needed to integrate the data analysis within the business activity.
Data usage in business decision- making can enhance competitiveness through the
reduction of costs, increased added value, or any other parameter that can be
measured against existing performance criteria.

2.6. Basic concepts of big data


A) What Is Big Data?
 Big data is a collection of data sets so large and complex that it becomes difficult
to process using on-hand database management tools or traditional data processing
applications.
 A “large dataset” means a dataset too large to reasonably process or store on a
single computer.
 Big data is characterized by 4V and more:
o Volume: large amounts of data Zeta bytes/Massive datasets
 This is data a rest
 Amount of data from Terabytes to Exabyte data to process
o Velocity: Data is live streaming or in motion
 This is data in motion
o Variety: data comes in many different forms from diverse sources
 Structured, unstructured, text, multimedia
o Veracity: can we trust the data? How accurate is it? etc.
 Data in doubt or uncertainty due to data inconsistency
B) Clustered Computing and Hadoop Ecosystem
 Clustered Computing
 Because of the qualities of big data, individual computers are often inadequate for
handling the data at most stages. To better address the high storage and
computational needs of big data, computer clusters are a better fit.
 Big data clustering software combines the resources of many smaller machines,
seeking to provide a number of benefits:
 Resource Pooling: Combining the available storage space to hold data
 High Availability: Clusters can provide varying levels of fault tolerance and
availability guarantees to prevent hardware or software failures from affecting
access to data and processing.
 Easy Scalability: Clusters make it easy to scale horizontally by adding
additional machines to the group.
 Cluster membership and resource allocation can be handled by SW like
Hadoop’s YARN (which stands for Yet Another Resource Negotiator).

 Hadoop Ecosystem
 Hadoop is an open-source framework (Program) intended to make interaction
with big data easier.
 It is a framework that allows for the distributed processing of large datasets
across clusters of computers using simple programming models.
 The four key characteristics of Hadoop are:
o Economical: ordinary computers can be used for data processing.
o Reliable: It is reliable as it stores copies of the data on different machines
and is resistant to hardware failure.
o Scalable: It is easily scalable both, horizontally and vertically. A few extra
nodes help in scaling up the framework.
o Flexible: It is flexible and you can store as much structured and
unstructured data as you need to and decide to use them later.
Review Questions
1. Explain the data science and the roles of a data scientist.
2. Discuss data and its types from computer programming and data analytics perspectives.
3. Discuss a series of steps needed to generate value and useful insights from data
4. What is the principal goal of data science?
5. List out and discuss the characteristics of Big Data.
6. How we ingest streaming data into Hadoop Cluster?

Chapter Three: Artificial Intelligence (AI)


3.1. What is Artificial Intelligence (AI)
- Artificial Intelligence is composed of two words Artificial and Intelligence.
 Artificial defines "man-made," and
 intelligence defines "thinking power", or “the ability to learn and solve problems”
Meaning Artificial Intelligence means "a man-made thinking power."

- So, we can define Artificial Intelligence (AI) as the branch of computer science by which we can
create intelligent machines which can behave like a human, think like humans, and able to make
decisions.
 Intelligence is the ability to acquire and apply knowledge.
 Knowledge is the information acquired through experience.
 Experience is the knowledge gained through training.
 Intelligence + Knowledge + Experience = copy of something natural
- Artificial Intelligence exists when a machine can have human-based skills such as learning,
reasoning, and solving problems
- Intelligence is composed of:
 Reasoning  Problem Solving
 Learning  Perception
 Linguistic Intelligence
- An AI system is composed of an agent and its environment.
 An agent (e.g., human or robot) is anything that can perceive its environment through
sensors and acts upon that environment through effectors.
 Intelligent agents must be able to set goals and achieve them.
 Machine perception is the ability to use input from sensors (such as cameras,
microphones, sensors, etc.) to deduce aspects of the world. e.g., Computer Vision.
 Machine Learning
o It is an advanced form of AI where the machine can
learn as it goes rather than having every action
programmed by humans.
o It was introduced by Arthur Samuel in 1959.

 deep learning
o it is the type of learning connected with a nerve or the nervous system
o it is a biologically inspired networks that extract features from the data in a
hierarchical fashion.
o The field of neural networks with several hidden layers is called deep
learning.

3.2. Why we need Artificial Intelligence (AI)?


 We need AI at this time for the following basic purpose.

1 . To create expert systems that show intelligent behavior with the capability to:
 Learn  explain and
 demonstrate  advice its users.
2. Helping machines find solutions to complex problems like humans do.
3.3. Goals of Artificial Intelligence

The major goal of Artificial Intelligence includes:


1. Replicate human intelligence
2. Solve Knowledge-intensive tasks
3. An intelligent connection of perception and action
4. Building a machine which can perform tasks that requires human intelligence such
as:
Proving a theorem
Playing chess
Plan some surgical operation
Driving a car in traffic
5. Creating some system which can exhibit intelligent behavior, learn new things by
itself, demonstrate, explain, and can advise to its user.

3.4. What are the basic disciplines Required by AI?

- Intelligence is an intangible part of our brain which is a combination of Reasoning, learning,


problem-solving, perception, language understanding, etc. To achieve the above factors for a
machine or software Artificial Intelligence requires the following disciplines:
 Mathematics  Computer Science
 Biology  Neurons Study
 Psychology  Statistics
 Sociology  Philosophy
3.5. Advantages of Artificial Intelligence
The advantages of Artificial Intelligence include the following:

 High Accuracy with fewer errors: AI machines or a system takes decisions as per pre-
experience or information.
 High-Speed: AI systems can be of very high-speed and fast-decision making
 High reliability: AI machines are highly perform the same action multiple times with
high accuracy.
 Useful for risky areas: AI machines can be helpful in situations such as defusing a
bomb, exploring the ocean floor, where to employ a human can be risky.
 Digital Assistant: AI can be very useful to provide digital assistant to users such as AI
technology is currently used by various E-commerce websites to show the products as per
customer requirements.
 Useful as a public utility: AI can be very useful for public utilities such as a self- driving car
which can make our journey safer, facial recognition for security purposes, etc.
3.6. Disadvantages of Artificial Intelligence
- The disadvantages of Artificial Intelligence include the following:
 High Cost: The hardware and software requirement of AI is very costly as it requires
lots of maintenance to meet current world requirements.
 Can't think out of the box: Even we are making smarter machines with AI, but still
they cannot work out of the box, it work for which they are trained, or programmed.
 No feelings and emotions: AI machines does not have the feeling so it cannot make any
kind of emotional attachment with humans
 Increase dependence on machines: With the increment of technology, people are
getting more dependent on devices and they are losing their mental capabilities.
 No Original Creativity: As humans are so creative and can imagine some new ideas
but still AI machines cannot beat this power of human intelligence and cannot be creative
and imaginative.
3.7. Levels of AI
- AI has seven levels. These are :
Level Maturity level Name Designed to identify:
1 Perception What’s happening now?
2 Notification What do I need to know?
3 Suggestion What do you recommended?
4 Automation What should I always do?
5 Predication What can I Expect to Happen?
6 Prevention What can I avoid?
7 Situational Awareness What do I need to do right now?
3.8. Types of AI
- Artificial Intelligence can be divided into various types. Based on their capabilities and functionally AI
mainly divided into two types. These are:
Artificial
Intelligenc
e

Type-1 Type-2
Based on Based on the
Capabilitie functionality
s

General Reactive Limited Theory of Self


Narrow AI Strong AI
AI Machine Memory mind Awareness

1) Based on their Capability


1) Narrow AI:
 It is some time called Weak AI
 It is able to perform a dedicated task with intelligence.
 It is the most common and currently available AI in the world of AI.
 It cannot perform beyond its field or limitations.
 It is termed as weak AI, b/c can fail in unpredictable ways if it goes beyond its limits.
Some Examples of Narrow AI are:
 Google translate  speech recognition and
 playing chess  Image recognition
 Self-driving cars
2. General AI:
 It is AI that could perform any intellectual task with efficiency like a human.
 Think like a human on its own
 Currently, there is no such system exists and still under research
3. Strong AI:
It is sometimes called Super AI.
Super AI is a level of Intelligence at w/c machines could surpass human
intelligence.
 Can perform any task better than a human with cognitive properties.
 This refers to aspects like general wisdom, problem solving and creativity. It is an
outcome of general AI.
A basic characteristic of strong AI includes:
 ability to think,
 ability to make judgments
 ability to plan, learn, and communicate on its own.
B) Based on the functionality
1) Reactive Machines
 Purely reactive machines are the most basic types of Artificial Intelligence.
 It do not store memories or past experiences for future actions.
 only focus on current scenarios and react on it as per possible best action.
Example:
o IBM's Deep Blue system
o Google's AlphaGo
2) Limited Memory
 Can store past experiences or some data for a short period of time.
 Can use stored data for a limited time period only.
Example: Self-driving cars can store the:
o recent speed of nearby cars
o distance of other cars
o Speed limits and other information to navigate the road.
3) Theory of Mind
 Theory of Mind AI should understand human:
o Emotions o beliefs and
o People o be able to interact socially like humans.
 This type of AI machines is still not developed, but researchers are making lots of
efforts and improvement for developing such AI machines.
4) Self-Awareness
 Self-awareness AI is the future of Artificial Intelligence.
 These machines will be smarter than the human mind.
 It does not exist in reality still and it is a hypothetical concept.
3.9. Applications of AI
- AI is making our daily life more comfortable and faster.
- The following are some sectors which have the application of Artificial Intelligence:
1) AI in agriculture
 Now a day's agriculture is becoming digital, and AI is emerging in this field.
 Agriculture is applying AI as agriculture robotics, solid and crop monitoring, predictive
analysis.
2) AI in Healthcare
 Healthcare Industries are applying AI:
 to make a better and faster diagnosis than humans.
 help doctors with diagnoses and can inform when patients are
worsening so that medical help can reach the patient before hospitalization.
3) AI in education:
 AI in the future can be work as a personal virtual tutor for students, which will be
accessible easily at any time and any place.
4) AI in Finance and E-commerce
 AI is helping shoppers to discover associated products with recommended size,
color, Machine learning into financial processes or even brand.
5) AI in Gaming
 AI can be used for gaming purposes. Example chess Game, w/c requires a large
number of possible places.
6) AI in Data Security
 AI can be used to make your data more safe and secure can protect user’s data from
cyber-attacks
7) AI in Social Media
 Social Media sites such as Facebook, Twitter, and other contain billions of user
profiles, which need to be stored and managed in a very efficient way. AI can
organize and manage massive amounts of data. AI can analyze lots of data to
identify the latest trends, hashtags, and requirements of different users.
8) AI in Travel &Transport
 AI is becoming highly demanding for travel industries.
 I t is capable of doing various travel related works like making travel arrangements
to suggesting the:
o Hotels
o flights, and best routes to the customers.
9) AI in the Automotive Industry
 Some Automotive industries are using AI to provide virtual assistants to their use for
better performance.
 Various Industries are currently working for developing self-driven cars which can make
your journey more safe and secure.
10) AI in Robotics:
 AI has a remarkable role in Robotics.
 Humanoid Robots are the best examples for AI in robotics, recently the intelligent
Humanoid robot named Erica and Sophia has been developed which can talk and
behave like humans.
11) AI in Entertainment
 We are currently using some AI-based applications in our daily life with some
entertainment services such as Netflix or Amazon.
Review Questions
1) Define artificial intelligence?
2) Why we need artificial intelligence?
3) Write down the driving factors which accelerated the rise of AI?
4) List down disciplines which artificial intelligence requires?
5) Write the advantages and disadvantages of AI?
6) Who coined the term AI for the first time?
7) What are the seven stages of AI? Briefly explain each of them?
8) Based on the functionality we can classify AI into four, briefly explain each of them?
9) Write down some applications of AI in agriculture, health, education, and business?
10) List down some concrete examples of AI in social media, online shopping, and
mobile phone usage?
Chapter Four: Internet of Things (IoT)
4. Overview of IoT
4.1. What is IoT?
The definition of the Internet of Things is related to different based on the following
particular concept in the whole world.
i) According to the Internet Architecture Board’s (IAB):
 IoT is the networking of smart objects.
 Meaning a huge number of devices intelligently communicating in the presence
of internet protocol that cannot be directly operated by human beings but exist as
components in buildings, the environment.
ii) According to the Internet Engineering Task Force (IETF) :
 IoT is the networking of smart objects in which smart objects have some
constraints such as limited bandwidth, power, and processing accessibility for
achieving interoperability among smart objects.

iii) According to the IEEE Communications category magazine’s:


 IEEE- stands for International Electrical and Electronics Engineering)
 IoT is a framework of all things that have a representation in the presence of the
internet
 It refers to the Machine-to-Machine (M2M) communication in the cloud.
iv) According to the Oxford dictionary’s:
 IoT is the interaction of everyday object’s computing devices through the
Internet that enables the sending and receiving of useful data.
v) according to the 2020 conceptual framework:
IoT= Services+ Data+ Networks + Sensors
The internet of things (IoT) has found its application in several areas such as connected industry,
smart-city, smart-home, smart-energy, connected car, smart agriculture, connected building and
campus, health care, logistics, among other
4.2. Advantages and Disadvantages of IoT
A) IoT – Advantages
- The advantages of IoT span across every area of lifestyle and business. Some of these are:
i. Improved Customer Engagement /commitment/
ii. Technology Optimization − improve the customer experience and device use
iii.Reduced Waste − provides real-world information leading to effective Mgt of
resource
iv.Enhanced Data Collection
B) IoT – Disadvantages
Here is a list of some of the disadvantages of IoT. these are:
 As the number of connected devices increases and more information is shared
between devices, the potential that a hacker could steal confidential information
also increases.
 If there’s a bug in the system, it’s likely that every connected device will become
corrupted.
 Since there’s no international standard of compatibility for IoT, it’s difficult for
devices from different manufacturers to communicate with each other.
 Enterprises may eventually have to deal with massive numbers maybe even
millions of IoT devices and collecting and managing the data from all those
devices will be challenging.
4.3. Challenges of IoT
Some challenges of IoT includes:
 Security − IoT constantly connected devices communicating over networks. This
leaves users exposed to various kinds of attackers.
 Privacy − The sophistication of IoT provides substantial personal data in extreme
detail without the user's active participation.
 Complexity − IoT systems complicated in terms of design, deployment, and
maintenance given their use of multiple technologies
 Flexibility − Many are concerned about the flexibility of an IoT system to integrate
easily with another. They worry about finding themselves with several conflicting or
locking systems.
 Compliance − IoT, like any other technology in the realm of business, must comply
with regulations. Its complexity makes the issue of compliance seem incredibly
challenging when many consider standard software compliance a battle.
4.4. Architecture of IoT
- An IoT device can be explained as a network of things that consists of hardware, software,
network connectivity, and sensors.
- The architecture of IoT devices contains four major components:
 Sensing  data processing, and
 Network  application layers
- A detailed description of these layers is given below.
1) Sensing Layer
 The main purpose of the sensing layer is to identify any phenomena in the devices’
peripheral and obtain data from the real world.
 This layer consists of several sensors. These are:
A) Motion Sensors:
 Used to measure the change in motion as well as the orientation of the devices.
 There are two types of motions one can observe in a device:
o Linear motion : refers to the linear displacement of an IoT
device
o Angular motions: refers to the rotational displacement of the
device.
B) Environmental Sensors:
 devices used to sense the change in environmental parameters in the device’s
peripheral.
 Sensors such as Light sensors, Pressure sensors, etc.
 Commonly used in Home automation systems, smart locks, smart light, etc
C) Position sensors:
 Position sensors deals with the physical position and location of the device.
 The most common position sensors used in IoT devices are:
o magnetic sensors and
o Global Positioning System (GPS) sensors.
 Magnetic sensors are usually used as digital compass and help to fix the
orientation of the device display.
 GPS sensor is used for navigation purposes in IoT devices.
2) Network Layer
- The network layer acts as a communication channel to transfer data, collected in the
sensing layer, to other connected devices.
- This layer allows data flow between other devices within the same network.
- The network layer is implemented by using diverse communication technologies. These
technologies can be:
o Wi-Fi, Bluetooth, Zigbee, Z- Wave, LoRa, cellular network, etc.
3) Data Processing Layer
- The data processing layer consists of the main data processing unit of IoT devices.
- The data processing layer takes data collected in the sensing layer and analyses the data
to make decisions based on the result.
- Examples of Data processing device of IoT includes:
 smartwatch, smart home hub etc.
- this layer can :
 analyses data to make decision
 Save the result of previous analysis.
 Share the result of data processing with other connected devices via the
network layer.
4) Application Layer
- The application layer implements and presents the results of the data processing layer to
accomplish disparate /unlike/ applications of IoT devices.
- It is a user-centric layer that executes various tasks for the users.
- Examples of Application layer of IoT includes :
 smart transportation, smart home, personal care, healthcare, etc.
Review Questions

1) What are the main parts of the IoT system?

2) What are the security concerns related to IoT?

3) Explain IoT Protocol stack?

4) What is meant by a smart city regarding the IoT?

5) Give examples of the impact of IoT on our lives?

6) What influence will the IoT have on monetary growth?

7) What impact will the IoT have on the health care sector?

8) What are the main social and cultural impacts of IoT?

9) What the main challenges of an IoT?

10) What role does the network play in the IoT of everything?

11) How wireless communication might affect the development and implementations of

IoT?
Chapter Five: Augmented Reality (AR)
5. Overview of augmented reality
5.1. What is Augmented Reality (AR)?
- It is the integration of digital information with the user's environment in real- time.
- AR is a form of emerging technology that allows users to overlay computer generated content
in the real world.
- AR refers to a live view of a physical real-world environment whose elements are merged
with augmented computer-generated images creating a mixed reality.
5.2. Virtual reality (VR), Augmented Reality (AR) Vs Mixed reality (MR)
A) Virtual Reality (VR)
 VR is fully immersive, which tricks your senses into thinking you’re in a different
environment or world apart from the real world.
 It refers to computer technologies using reality headsets to generate realistic:
 Sounds
 images and
 Other sensations that replicate a real environment or create an imaginary world.
 Advanced VR environment will engage all five senses (taste, sight, smell, touch,
sound), but it is important to say that this is not always possible
Example:

B) Augment Reality(AR)
 Augmented Reality (AR) is a live, direct or indirect view of a physical, real-world
environment whose elements are augmented (or supplemented) by computer-generated
sensory input such as sound, video, graphics or GPS data
Example:

C) Mixed Reality (MR)


 It is sometimes referred to as hybrid reality, b/c it is the merging of real and virtual
worlds to produce new environments and visualizations where physical and digital
objects co-exist and interact in real-time. It means placing new imagery within a real
space in such a way that the new imagery is able to interact, to an extent, with what is
real in the physical world we know.
5.3. Applications of AR Systems
- AR can be applied to many different disciplines such as education, medicine,
entertainment, military, etc.
- AR technology can be utilized through a variety of mediums including desktops, mobile
devices, and smart phones. The technology is portable and adaptable to a variety of
scenarios.
A)Education
 When using AR technology in the classroom, teachers can create an valid(authentic)
learning environment for students with different learning styles.
 More importantly, the following reasons for using augmented reality in education:
 Affordable learning materials
o posters, digital illustrations, physical models, prototypes are very expensive
o Students can get access to learning materials and interact with them anytime.
 Interactive lessons
o When AR technology is used in classrooms, students can view models on their
own smart phones and get a better idea of the concepts they are studying.
 Higher engagement –
o It increase student’s interest and make easier learning.
o When teachers integrate augmented reality into their lectures, they attract the
attention of their students and make lessons more effective.
 Higher retention
o using the AR app, students can get access to augmented models that represent
any real objects from a famous monument or work of art to a molecule. Besides,
students can get access to a website with specific information. When learning
with AR technology, students use different senses and retain more knowledge for
a long time.
 Boost intellectual curiosity/ increase intellectual interest/
o AR makes students more excited about learning certain subjects. Modern students
were born in a digital era so they will always be excited with innovative
technologies that can help them learn new ideas and develop their critical
thinking skills.

B) Medicine
- Augmented reality is one of the current technologies changing all industries, including
healthcare and medical education.
- The purpose of any invention and technology is to simplify our life. Augmented reality has
the potential to play a big role in improving the healthcare industry.
- Augmented reality has already made significant changes in the following medical areas:
o surgery (minimally invasive surgery)
o education of future doctors
o diagnostics
o AR tools may also aid to detect the signs of depression and other mental
illnesses by reading from facial expressions, voice tones, and physical gestures
- In medicine, AR has the following applications:
1) Describing symptoms –
 it impacts on finding out the accurate diagnosis.
 It helps patients to understand their conditions and describe correctly their
symptoms.
2) Nursing care :
 It is used to decrease mistake by supporting nurses while the provide service for
patient.
3) Surgery: It support doctors by producing Three- dimensional reconstructions of organs or
tumors will help surgeons become more efficient at surgery operations.
4) X-Ray and Ultrasounds technology
Generally, AR provides the following benefits to patients and healthcare workers:

 Reduce the risks associated with minimally invasive surgery.


 Better informed decisions about the right treatment and illness prevention.
 Make procedures more tolerable.
 Better aftercare
 Medical training and education.
 Assistance in medical procedures and routine tasks.
C)Entertainment
 AR can be used in Entertainment industries like in:
 Music industries  live shows industries
 Movies industries  Games industries
Chapter Five Review Questions

1) What is augmented, virtual and mixed reality and its application?

2) What are good examples of augmented, virtual and mixed reality?

3) What is the difference between augmented, virtual and mixed reality?

4) How is augmented, virtual and mixed reality achieved?

5) What is the benefit of augmented, virtual and mixed reality?

6) How Can AR, VR, and MR improve engineering instructions?

7) Can VR be a substitute for Real Life Experience?

8) What is the impact of VR on Educational Learning rather than games?

9) What is the most technical challenge for MR?

Chapter Six
6. Ethics and Professionalism of Emerging Technologies
6.1. Technology and ethics
 The Internet boom (sudden increase) has provided many benefits for society,
allowing the creation of new tools and new ways for people to interact.
 As with many technological advances, however, the Internet has not been without
negative aspects.
For example, it has created new concerns about privacy, and it has been hampered (in
a weak position) by spam and viruses. Moreover, even as it serves as a medium for
communication across the globe, it threatens to cut off people who lack access to it.
 Technology can serve to promote or restrict human rights. The Information Society
should foster (promote) the use of emerging technologies in such a way as to
maximize the benefits that they provide while minimizing the harms.
 Ethics is particularly important for the accountancy profession, with a code for
professional ethics based on five basic principles. These are:
 Integrity

 Objectivity

 competence and
due care
 confidentiality, and
 Professional behavior.
6.2. New ethical issues
-Basically, refers to ethics in technologies include but not limited to:
6.2.1. General ethical principles
- The common ethical rules that must be applied in all technologies includes:
 Contribute to society and to human well-being
 Acknowledging that all people are stakeholders in
computing.
 Avoid harm.
 Be honest and trustworthy.
 Be fair and take action not to discriminate
 Respect the work required to produce new ideas,
inventions, creative works, and computing artifacts
 Respect privacy
 Honor (credit) confidentiality

6.2.2. Professional responsibilities


- Eethical principles related to professional responsibility includes:
1. Strive (do your best) to achieve high quality in both the processes and
products of professional work.
2. Maintain high standards of professional competence, conduct, and
ethical practice.
3. Know and respect existing rules pertaining to professional work.
4. Accept and provide appropriate professional review.
5. Perform work only in areas of competence.
6. Foster (encourage) public awareness and understanding of computing,
related technologies, and their consequences.
7. Access computing and communication resources only when authorized
or when compelled by the public good.
8. Design and implement systems that are robustly (strongly) and usably
secure.
6.2.3. Professional leadership principles.
Ethical principles related to professional leadership includes:
1) Ensure that the public good is the central concern during all professional
computing work.
2) Articulate, encourage acceptance of and evaluate fulfillment of social
responsibilities by members of the organization or group.
3) Manage personnel (workers) and resources to enhance the quality of
working life
4) Create opportunities for members of the organization or group to grow as
professionals
5) Use care when modifying or retiring systems
6) Recognize and take special care of systems that become integrated into
the infrastructure of society and etc
6.3. Digital privacy
- Digital Privacy is the protection of personally, or business identifiable information that is
collected from respondents through information collection activities or from other sources.
- This refers to encompasses three sub-related categories; information privacy,
communication privacy, and individual privacy
6.3.1. Information Privacy
 Information privacy is the notion (idea) that individuals should have the
freedom, or right, to determine how their digital information is c o l l e c t e d and
used.
6.3.2. Communication Privacy
 communication privacy is the notion (idea) that individuals should have
the freedom, or right, to communicate information digitally with
the expectation that their communications are secure.
 Meaning that messages and communications will only be accessible to
the sender’s original intended recipient.
6.3.3. Individual Privacy
 Individual privacy is the notion (idea) that individuals have a right to exist
freely on the internet, in that they can choose what types of information they
are exposed to, and more importantly that unwanted information should not
interrupt them.
 An example of a digital breach of individual privacy would be an internet user
receiving unwanted ads and emails/spam, or a computer virus that forces the
user to take actions they otherwise wouldn't.
6.3.4. Some digital privacy principles
 To make your data as well as your communication private consider the following:
 Data Minimization: collect the minimal amount of information necessary from
individuals the Department’s mission and legal requirements
 Transparency: information will be provided in a clear manner. Information
collected will not be used for any other purpose unless authorized or mandated by
law.
 Accuracy: Information collected will be maintained in a sufficiently accurate,

timely, and complete manner to ensure that the interests of the individuals and

businesses are protected.


 Security: sufficient physical and IT security measures will be implemented to

ensure that the collection, use, and maintenance of identifiable information are

properly protected and the information is promptly destroyed in accordance

with approved records control

6.4. Accountability and trust


- Accountability refers to the obligation of an individual or organization to account for its
activities, accept responsibility for them, and to disclose the results in a transparent manner.
It also includes the responsibility for money or other entrusted property.

- When emerging technology creates far-reaching and rapid change, it can also bring new risks.
This challenge (risk) is exacerbated by the speed at which technological change is
occurring and the breadth (extent) of its adoption – which is introducing new risks that
demand new responses.
- Emerging technologies can provide improved accuracy, better quality and cost efficiencies for
businesses in every sector. They can enhance trust in the organization’s operations and
financial processes, which is crucial for sustainable success. But this can produce a paradox:
the very solutions that can be used to better manage risk, increase transparency and build
confidence are often themselves the source of new risks, which may go unnoticed.

6.5. Treats and challenges


6.5.1. Ethical and regulatory challenges
 With Technology moving at a fast pace it is always been a challenge for
Security.
 As security professionals, we need to keep pace with ever-changing technology
and be aware of the AI, IoT, Big Data, Machine Learning, etc.
Example:
6.5.1.1. Challenges in using Artificial Intelligence
- AI has wide possible application areas. When implementing the applications of AI in
industries the dilemma that comes along with AI may includes but not limited to:
 It’s potential to replace human workers.
 They could begin to replace experts in higher-level jobs.
 Has the potential to take the burden of laborious and time-consuming tasks
from these people, freeing up their time and brainpower for other things.
But:
 Managing the challenges posed by AI will require careful planning to ensure that the
full benefits are realized and risks are mitigated.
6.5.1.2. Challenges in using Robotics in manufacturing
- With automation and robotics moving from production lines out into other areas of work and
business, the potential for humans losing jobs is great here too.
- As automation technologies become more advanced, there will be a greater capability for
automation to take over more and more complex jobs.
- As robots learn to teach each other and themselves, there is the potential for much greater
productivity but this also raises ethical and cyber security concerns.

6.5.1.3. Challenges in using the Internet of Things


- As more and more connected devices (such as smart watches and fitness trackers) join the
Internet of Things (IoT) the amount of data being generated is increasing. Companies will
have to plan carefully how this will affect the customer-facing application and how to best
utilize the masses of data being produced. There are also severe security implications of mass
connectivity that need to be addressed.
6.5.1.4. Challenges in Big Data
- Almost all the technologies mentioned above have some relation to Big Data. The huge
amount of data being generated on a daily basis has the potential to provide businesses with
better insight into their customers as well as their own business operations.
- Although data can be incredibly useful for spotting trends and analyzing impacts, surfacing all
this data to humans in a way that they can understand can be challenging. AI will play a role
here.
6.5.2. Treats
- Treat refers to some risks in emerging technologies. These may includes but not limited
to:
 Driverless car: while a compelling option for future fleer cars, companies could
crash and burn from claims related to bodily injury and property damage.
 Wearable: Google glass, Fitbit and other wearables can expose companies to the
invasion of privacy claims that may not be covered by general liability or personal
injury claims that weren’t foreseen.
 Drones: Turbulence is in the offing for manufacturers and organizations that fail to
protect themselves for property damage and bodily injury, as well as errors and
omissions.
 Internet of things: The proliferation of sensors and cross-platform integration
creates potential exposure from privacy invasion, bodily injury and property
damage that may connect an organization to huge liabilities.
Review Questions
1) What is the importance of ethics in emerging technologies?
2) List down some general ethical rules?
3) List down some professional responsibility related to ethical rules
4) What is digital privacy? What is its importance?
5) Why we need accountability in using emerging technologies?
6) Briefly explain the challenges in using:
7) Briefly explain the risks we face in augmented reality, IoT and AI?
a. AI? b. Robots? c. IoT?
8) Do you think that dealing with big data demands high ethical regulations, accountability, and
responsibility of the person as well as the company? Why?

Chapter Seven
7. Other emerging technologies Technology and ethics
-Emerging technology includes technologies like:
 data science,
 artificial intelligence,
 the internet of things and
 Augmented reality and their ethical issues which had Explained in chapter 1 to
chapter six.
- There are also some other emerging technologies like:
a) Nanotechnology e) autonomic computing
b) Biotechnology f) computer vision technology
c) block-chain technology g) embedded systems technology
d) cloud and quantum computing h) cyber security technology and
technology i) 3D printing technology
7.1. Nanotechnology
 Definitions of Nanotechnology
 Nanotechnology are the study and application of extremely small things and
can be used across all the other science fields, such as:
 chemistry  materials science and
 Biology  Engineering
 Physics
 Nanoscience and nanotechnology involve the ability to see and to control individual
atoms and molecules. Everything on Earth is made up of atoms—the food we eat, the
clothes we wear, the buildings and houses we live in, and our own bodies.
 Application of Nanotechnology
i. Medicine: customized nanoparticles the size of molecules that can deliver drugs
directly to diseased cells in your body. When it's perfected, this method should greatly
reduce the damage treatment such as chemotherapy does to a patient's healthy cells.
ii. Electronics: it has some answers for how we might increase the capabilities of
electronics devices while we reduce their weight and power consumption.
iii. Food: it has an impact on several aspects of food science, from how food is grown to
how it is packaged. Companies are developing nanomaterials that will make a
difference not only in the taste of food but also in food safety and the health benefits
that food delivery.
iv. Agriculture: nanotechnology can possibly change the whole agriculture part
and nourishment industry anchor from generation to preservation, handling,
bundling, transportation, and even waste treatment.
v. Vehicle manufacturers: Much like aviation, lighter and stronger materials will
be valuable for making vehicles that are both quicker and more secure.

7.2. Biotechnology
 Definition of Biotechnology
- It is any technological application that uses biological systems, living organisms, or
derivatives thereof, to make or modify products or processes for specific use.
- It is technology based on biology - biotechnology harnesses cellular and bio molecular
processes to develop technologies and products that help improve our lives and the health of
our planet.
- Biotechnologies disciplines includes but not limited to:
 genetics,
 biochemistry
 molecular biology
 Definition of Biotechnology
a) Agriculture (Green Biotechnology):
- It deals with genes of the organism known as Genetically Modified Organisms.These
include Crops, Animals, Plants, Fungi, Bacteria, etc.
- Genetically modified crops are formed by the manipulation of DNA to introduce a new trait
into the crops.
- Basically, these manipulations are done to introduce traits (qualities) such as:
 pest resistance,
 insect resistance,
 Weed resistance, etc.
b) Medicine (Medicinal Biotechnology):
- It deals with the formation of genetically modified insulin known as humulin & Gene therapy.
- Humulin helps in the treatment of a large number of diabetes patients.
- Gene therapy is a technique to remove the genetic defect in an embryo or child. And also
used for the transfer of a normal gene that works over the non-functional gene.
c) Aquaculture Fisheries:
- It deals with the process of improving the quality and quantity of fishes.
d) Environment (Environmental biotechnology):
- This technology is used in waste treatment and pollution prevention.
7.3. Block-chain technology
 Definition
- Block chain is a growing list of records, called blocks that are linked using cryptography.
Each block contains a cryptography hash of the previous block, a timestamp, and transaction
data.
- A block chain is, a time-stamped series of immutable (unchallengeable) records of data that is
managed by a cluster of computers not owned by any single entity.
- Each of these blocks of data (i.e. block) is secured and bound to each other using
cryptographic principles (i.e. chain). “Blocks” on the blockchain are made up of digital
pieces of information. Specifically, they have three parts:
1) Blocks store information about transactions
 It store about date, time, and dollar amount of your most recent
purchase from Amazon.
2) Blocks store information about who is participating in transactions.
Example
 Amazon would record your name along with Amazon.com.
 Instead of using your actual name, your purchase is recorded without
any identifying information using a unique “digital signature,” sort of
like a username.
3) Blocks store information that distinguishes them from other blocks.
- In order for a block to be added to the block chain, four things must happen:
i. A transaction must occur.
ii. That transaction must be verified
iii. That transaction must be stored in a block
iv. That block must be given a hash (mix up) or
hexadecimal code .
 The Three Pillars of Blockchain Technology
The three main properties of Block chain Technology are:
1) Decentralization
 In Decentralization the information is not stored by one single entity. Everyone in the
network owns the information.
2) Transparency
 One of the most interesting and misunderstood concepts in blockchain technology
is “transparency.”
3) Immutability
➢ Immutability, in the context of the blockchain, means that once something has been entered
into the blockchain, it cannot be tampered with.
7.4. Cloud and quantum computing technology
- Cloud computing is a means of networking remote servers that are hosted on the Internet.
- Rather than storing and processing data on a local server, or a PC's hard drive, one of the
following three types of cloud infrastructure is used:
1) A public cloud:
 In public cloud a third-party provider manages the servers, applications, and storage
much like a public utility.
 Anyone can subscribe to the provider’s cloud service, which is usually operated
through their own data center.
2) A business or organization cloud:
 It is a private network accessible over the Internet
 Typically use a private cloud. This might be hosted on their on- site data center.
3) hybrid cloud
 Here private clouds are connected to public clouds, allowing data and applications to
be shared between them.
 Private clouds existing alone can be very limiting, and a hybrid offers a business more
flexibility.
 a hybrid cloud includes multiple service providers.
 It can offer more computing capacity for a business application when the need for its
spikes.
- Cloud computing service mainly focus on infrastructure, web development or a cloud-based
application.
7.5. Advantages and Disadvantages of cloud computing
7.5.1. Advantages
 Lower-cost computers for users: This is the financial advantages of cloud computing.
 Better performance: Due to the fact that no programs or files are loaded on the local PC,
users will not experience delays when switching on/off their computers and also the internal
network will be much faster since no internal traffic will occur.
 Less IT infrastructure costs: The IT department of large organizations could experience
decreasing on the expenses in regards with infrastructure with the adoption of the cloud
computing technology.
 Less maintenance costs: Maintenance costs also will be reduced using cloud computing
since both hardware and software maintenance for organizations of all sizes will be much
less.
 Lower software costs: Using cloud computing there is no need to purchase software
packages for each computer in the organization, only those employees actually using an
application need access to that application in the cloud.
 Automatic software updates: All the software’s need update and the great thing with cloud
computing is that you do not have to worry for any updates and also your organization will
not have any additional expenses when a new upgrade or update is necessary.
 Increased computing power: When using cloud computing, you can use the cloud
computing power since you are no longer limited to what a single desktop computer can do.
 Unlimited storage capacity: The cloud offers virtually limitless storage capacity but at any
time you can expand your storage capacity with a small additional charge on your monthly
fee.
 Increased data safety: There is no point to worry for disk failures or a disaster at your
office. All the data is stored in the cloud.
 Anywhere access to your documents: When you are in the cloud, there is no need to take
your documents with you. Instead, you can access your actual PC from anywhere that there is
Internet access available.
 Latest version availability: One more thing in relation with documents is that when you edit
one document at the office and then you go somewhere else and open it, the latest version will
be displayed since as I already aforementioned all the work is done centrally in the cloud.
 Use your computer from anywhere: This is one of the biggest advantages of cloud
computing. Basically, when you use this technology, you are not limited to work on a single
PC. You just use your “cloud PC” from anywhere and any PC and your existing applications
and documents follow you through the cloud. Move to a portable device, and your
applications and documents are still available.
7.5.2. Disadvantages

 Internet connection is required: It is impossible to work if your Internet connection is


down.
 Low-speed connections are not recommended: cloud computing cannot work with slow
Internet connections such as dial-up since web-based applications often require a lot of
bandwidth to download, as do large documents. it requires at least 1 Mbps connection.
 Sometimes is slow: sometimes you might experience delays since web-based applications
can sometimes be slower than accessing a similar software program on your desktop PC. The
reasons for that are because of the demanding upload and download bandwidth that web
applications need.
 Stored data might not be secure: Data is stored “in the cloud”. However, where exactly is
the cloud and is it really secure? These are questions arising for users that have confidential
data.
 Your data is 100% in the cloud: All the data that you had until now on your local PC, it is
stored in the cloud. Theoretically, data stored in the cloud is safe since a cloud hosting
company uses several ways of backup in order ensure that on any case the data will not be
lost. However, if your data is missing (even one in a million), you have no physical or local
backup of your data.
7.6. Quantum Computing
7.7.
7.8. Autonomic computing

7.9. Computer vision technology


7.10. Embedded systems technology
7.11. Cyber security technology and
7.12. 3D printing technology

You might also like