Chapter 7 Lecture
Chapter 7 Lecture
Other Emerging
Technologies
1
Nanotechnology
Nanotechnology is science, engineering, and technology
conducted at the nanoscale, which is about 1 to 100
nanometers.
Nanoscience and Nanotechnology are the study and
application of extremely Small Things and can be used
across all the other science fields, such as chemistry,
biology, physics, materials science, and engineering.
Nanoscience and nanotechnology involves the ability to see
and to control individual atoms and molecules.
Nanoscience as the study of phenomena and manipulation of
materials at atomic, molecular and macromolecular scales. 2
Applications of Nanotechnology
Medicine: Customized
nanoparticles the size of
molecules that can deliver drugs
directly to diseased cells in
your body.
5
Biotechnolo
“Biotechnology is technology based on Biology.”
9
The three Pillars of Blockchain
Technology
The three main properties of Blockchain Technology are:
1. Decentralization
➢ An information is not stored by one single entity.
Everyone in the network owns the information.
➢ If you wanted to interact with your friend then you can
do so directly without going through a third party. That
was the main ideology behind Bitcoins.
2.
Transparency
Person’s real identity is secure, and all the
transactions that were done by their public address
10
3.
o
Immutability
Once something has been entered into the blockchain, it
cannot be tampered with.
o The reason why the blockchain gets this property is that of
the cryptographic hash function.
o Crypto currencies like bitcoin, the transactions are
taken as input and run through a hashing algorithm
(Bitcoin uses SHA-256) which gives an output of a fixed
length.
11
Cont’
d
Service
cloud Models 14
Cont’d
Three types of cloud:
1. Public Cloud: A third-party provider manages
the servers, applications, and storage much
like a public utility.
2. Private cloud: Hosted on organizations onsite
datacenter.
3. Hybrid Cloud. The private clouds are connected
to public clouds, allowing data and applications
to be shared between them. 15
Cont’d
Cloud computing services can focus on
infrastructure, web development or a cloud-based app.
Infrastructure as a Service (IaaS) gives you
management of the whole deal: servers, web
development tools, applications.
Example : WWW
User: IT
16
Cont’d
Platform as a Service (PaaS) offers a complete
web development environment, without the
worry of the hardware that runs it.
User: software 17
Cont’
d
Software as a Service (SaaS) allows access to
cloud-based apps, usually through a web browser
interface. SaaS is the top of the stack.
IBM, Amazon, and Google have offered commercially
viable, high-capacity networks.
User: End 18
Advantages of Cloud
Cloud Computing
providers have vast resources of computing power at
their fingertips.
Cloud providers source on a global scale.
They can deliver the precise bandwidth, storage and power
business needs when it needs it.
The cloud allows you and multiple users to access your data
from any location.
Smartphone, laptop, desktop, wherever you are, you can
access the data you need at any time.
With cloud computing a business processes its data more
efficiently, increasing productivity.
19
Quantum
Quantum Computing
computers truly do represent the next
generation of computing.
Give clients access to a quantum computer over the
internet.
Currently, the only organization which provides a quantum
computer in the cloud is IBM.
With a quantum computer, the data is stored in qubits.
20
Cont’
d
Qubit stands sequence of quantum bits. Quantum
computers are big machines.
With a classic computer, data is stored in tiny
transistors that hold a single bit of information, either
the binary value of 1 or 0.
Thanks to the mechanics of quantum physics, where
subatomic particles obey their own laws, a qubit can
exist in two states at the same time.
This phenomenon is called superposition.
A qubit can have a value of 1, 0, or some value
21
between.
Advantages of Quantum
Getting a quantum computer to function usefully is an exciting
Computing
prospect for scientists.
Gargantuan computing power would allow them to crunch very
long numbers.
They would be able to make complex calculations that would
only overwhelm classic computers.
Accessing a cloud-based quantum computer combines the
benefits of both technologies exponentially.
Quantum computing could help in the discovery of new drugs,
by unlocking the complex structure of chemical molecules.
With its ability to handle more complex numbers, data could 22be
Autonomic Computing (AC)
AC is an approach to address the complexity and evolution
problems in software systems.
It is a self-managing computing model.
Control the functioning of computer applications and
systems without input from the user.
The goal of autonomic computing is to create systems that run
themselves, capable of high-level functioning while keeping the
system's complexity invisible to the user.
It refers to the self-managing characteristics of distributed
resources, adapting to unpredictable changes while hiding
intrinsic complexity to operators and users.
23
Characteristics of Autonomic
Systems
An autonomic system:
o Self-configure at runtime to meet changing operating
environments
o Self -tune to optimize its performance
o Self-heal when it encounters unexpected obstacles during
its operation, & of particular current interest.
o Protect itself from malicious attacks.
o Self-manage anything including a single property or multiple
properties.
24
Cont’d
➢ Self-Awareness: An autonomic application/system
“knows itself” and is aware of its state and its behaviors.
➢ Self-Configuring: An autonomic application/system
should be able to configure and reconfigure itself under
varying and unpredictable conditions.
➢ Self-Optimizing: An autonomic application/system
should be able to detect suboptimal behaviors and
optimize itself to improve its execution.
➢ Self-Healing: An autonomic application/system should
be able to detect and recover from potential problems
and continue to function smoothly. 25
Cont’d
33
Embedded
Systems
It is a controller with a dedicated
function within a larger
mechanical or electrical system,
often with real-time computing
constraints.
It is embedded as part of a
complete device often including
hardware and mechanical parts.
Modern embedded systems are
(i.e. microprocessors with integrated memory and peripheral
often based on
interfaces), but ordinary microprocessors 34
Cont’d
(using external chips for memory
and peripheral interface circuits)
are also common, especially in
more complex systems.
A common standard class of
dedicated processors is the
Digital Signal Processor (DSP).
A combination of hardware and
software which together form a
component
Note: 98%ofof
a all
larger machine
microprocessors manufactured are used in
embedded systems. 35
Advantages and Disadvantages of
Embedded System
Advantages of Embedded
➢ Easily Customizable .
➢ Low power consumption .
➢ Low cost.
➢ Enhanced performance.
Disadvantages of Embedded systems
➢ High development effort.
➢ Larger time to market .
36
Basic Structure of an Embedded
System
y
damage to their hardware, software, or electronic data, as
well as from the disruption or misdirection of the services
they provide.
o The field is becoming more important due to increased
reliance on computer systems,
The Internet and wireless network standards such as
Bluetooth and Wi-Fi, and due to the growth of smart devices,
including smartphones, televisions, and the various devices
that constitute the IoTs.
Due to its complexity, both in terms of politics and
39
Cont’
d
Cyber security is often confused with information
security but it focuses on protecting computer systems
from unauthorized access or being otherwise damaged
or made inaccessible.
Information Security is a broader category that looks to
protect all information assets, whether in hard copy or in
digital form.
The term cybercrime is used to describe an unlawful
activity in which computer or computing devices such as
smartphones, tablets, Personal Digital Assistants (PDAs),
40
Cyber Security
The following
Measures
are some security measures to be taken to prevent
cybercrimes:
➢Staff Awareness Training:-Human error is the leading cause of
data breaches, so you need to equip staff with the knowledge to deal
with the threats they face.
➢Application Security:-Web application vulnerabilities are a
common point of intrusion for cybercriminals.
➢Network Security:-It is the process of protecting the usability and
integrity of your network and data.
➢Leadership Commitment:-It is the key to cyber resilience.
➢Password Management:-Almost half of the UK population uses
41
Types Of Cyber Security
➢Ransomware: - It is a typeThreats
of malicious software. It is designed to
extort money by blocking access to files or the computer system until
the ransom /money is paid..
Malware:- it is a type of software designed to gain unauthorized
access or to cause damage to a computer.
➢Social Engineering: - it is a tactic that adversaries use to trick you
into revealing sensitive information.
o It can be combined with any of the threats listed above to make you
more likely to click on links, download malware, or trust a malicious
source.
➢Phishing: - it is the practice of sending fraudulent emails that
resemble emails from reputable sources. 42
Benefits of Cyber
The Security
following are the benefits of utilizing cyber security
include:
➢ Business protection against malware, ransomware,
phishing, and social engineering.
➢ Protection for data and networks.
➢ Prevention of unauthorized users.
➢ Improves recovery time after a breach.
➢ Protection for end-users.
➢ Improved confidence in the product for both
developers and customers
43
Cyber Security Vendors
Vendors in cyber security fields will typically use endpoint, network
and advanced threat protection security as well as data loss
prevention. Three commonly known cyber security vendors include
Cisco,
McAfee, and
Trend Micro.