Digital Fluency 2023
Digital Fluency 2023
• Artificial Intelligence
• Machine Learning
• Deep Learning
• Database Management for Data Science
• Big Data Analytics
• Internet of Things (IoT)
• Industrial Internet of Things (IIoT)
• Cloud computing and its service models
• Cyber Security and Types of cyber attack
Government Agencies: Government agencies such as public safety and utilities have a particular need
for machine learning since they have multiple sources of data that can be mined for insights. Analyzing
sensor data, for example, identifies ways to increase efficiency and save money. Machine learning can
also help detect fraud and minimize identity theft.
Healthcare: Machine learning is a fast-growing trend in the health care industry, thanks to the advent of
wearable devices and sensors that can use data to assess a patient's health in real time. The technology can
also help medical experts analyze data to identify trends or red flags that may lead to improved diagnoses
and treatment.
Retail: Websites recommending items you might like based on previous purchases are using machine
learning to analyze your buying history. Retailers rely on machine learning to capture data, analyze it and
use it
Oil and Gas: Finding new energy sources. Analyzing minerals in the ground. Predicting refinery sensor
failure. Streamlining oil distribution to make it more efficient and cost-effective. The number of machine
learning use cases for this industry is vast – and still expanding.
Semi-supervised Learning: Semi-supervised learning is useful when the cost is too high to
allow for a fully supervised process. Examples of this include identifying a person's face on a
web cam.
Reinforcement Learning: This is often used for robotics, gaming and navigation. With
reinforcement learning, the system discovers through trial and error which actions yield the
greatest rewards.
• Deep Learning is a prime technology behind the technology such as virtual assistants,
facial recognition, driverless cars, etc.
• The working of deep learning involves training the data and learning from the
experiences.
• The learning procedure is called ‘Deep’, as with every passing minute the neural networks
rapidly discover the new levels of data. Each time data is trained, it focuses on enhancing
the performance.
• With the increasing depth of the data, this training performance and deep learning
capabilities have been improved drastically, and this is because it is broadly adopted by
data experts.
Networks IoT components are tied together by networks, using various wireless
and wired
technologies, standards, and protocols to provide pervasive
connectivity.
1. As simple as a connected rat trap which relays information about catching a rat to a
mobile phone,
2. Slightly complex like a soil sensor which relays data about humidity and nutrient
content to a system
3. Complex system like smart parking and traffic management
4. A very complex set-up like a fully automated automobile assembly line relaying data
in real-time to human supervisors.
IoT IIoT
It focuses on general applications It focuses on industrial applications such as
ranging from wearables to robots & manufacturing, power plants, oil & gas, etc.
machines.
Its implementation starts with small It uses critical equipment & devices
scale level so there is no need to worry connected over a network which will cause a
about life-threatening situations. life threatening or other emergency situations
on failure therefore uses more sensitive and
precise sensors.
It deals with small scale networks. It deals with large scale networks.
It offers easy off-site programming. It can be programmed remotely i.e., offers
remote on-site programming.
It handles very high volume of data. It handles data ranging from medium to high.
It requires identity and privacy. It requires robust security to protect the data.
It is having short product life cycle. It having very long life cycle.
It is less reliable. It has high- reliability.
There are the following operations that we can do using cloud computing:
• Developing new applications and services
• Storage, back up, and recovery of data
• Hosting blogs and websites
• Delivery of software on demand
• Analysis of data
• Streaming videos and audios
There are three types of cloud service models. They are as follows: -
• Infrastructure as a Service (IaaS)
• Platform as a Service (PaaS)
• Software as a Service (SaaS)
Public Cloud:
Public cloud is open to all to store and access
information via the Internet using the pay-per-
usage method. In public cloud, computing
resources are managed and operated by the Cloud
Service Provider (CSP). Example: Amazon elastic
compute cloud (EC2), IBM SmartCloud
Enterprise, Microsoft, Google App Engine,
Windows Azure Services Platform.
Davangere University DOS in Computer Science
Types of Cloud:
Private Cloud:
Private cloud is also known as an internal cloud
or corporate cloud. It is used by organizations
to build and manage their own data centers
internally or by the third party. It can be
deployed using Open source tools such as Open
stack and Eucalyptus.
Hybrid Cloud
Hybrid Cloud is a combination of the public
cloud and the private cloud. We can say:
Hybrid Cloud = Public Cloud + Private Cloud.
Hybrid cloud is partially secure because the
services which are running on the public cloud
can be accessed by anyone, while the services
which are running on a private cloud can be
accessed only by the organization's users.
Example: Google Application Suite (Gmail,
Google Apps, and Google
Drive), Office 365 (MS Office on the Web and
One Drive), Amazon Web Services.
Davangere University DOS in Computer Science
Types of Cloud:
Community Cloud:
Community cloud allows systems and services to be accessible by a group
of several organizations to share the information between the organization
and a specific community. It is owned, managed, and operated by one or
more organizations in the community, a third party, or a combination of
them. Example: Health Care community cloud.
3. Network security: As cyber security is concerned with outside threats, network security
guards against unauthorized intrusion of your internal networks due to malicious intent.
Network security ensures that internal networks are secure by protecting the infrastructure
and inhibiting access to it.
Common examples of network security implementation:
• extra logins
• new passwords
• application security
4. Cloud security:Improved cyber security is one of the main reasons why the cloud is
taking over. Cloud security is a software-based security tool that protects and monitors the
data in your cloud resources. Cloud providers are constantly creating and implementing
new security tools to help enterprise users better secure their data.
5. Internet of things (IoT) security: IoT refers to a wide variety of critical and non-
critical cyber physical systems, like appliances, sensors, televisions, wifi routers, printers,
and security cameras. According to Bain & Company’s prediction…
• The combined markets of IoT will grow to about $520 billion in 2021;
• More than double the $235 billion spent in 2017.
2. Phishing: Phishing attacks are extremely common and involve sending mass
amounts of fraudulent emails to unsuspecting users, disguised as coming from a
reliable source. The fraudulent emails often have the appearance of being legit, but
link the recipient to a malicious file or script designed to grant attackers access to
your device to control it or gather recon, install malicious scripts/files, or to extract
data such as user information, financial info, and more.
1. Artificial Intelligence
2. Big Data Analytics
3. Internet of Things
4. Cloud Computing
5. Cyber Security
• R-Programming
• Altamira LUMIFY
• Apache Hadoop
• MongoDB
• RapidMiner
• Apache Spark
• Microsoft Azure
• Zoho Analytics