0% found this document useful (0 votes)
38 views

Week 15 17 Lesson

This document discusses several key IT trends, issues, and challenges. It covers the following trends: artificial intelligence and machine learning, edge computing and quantum computing, cybersecurity, blockchain, and virtual/augmented reality. It also discusses common types of malware like ransomware, spyware, trojans, and worms. Additionally, it covers issues around data security, big data, cloud computing, open source software, mobile payments, social media liabilities, wearable tech, the internet of things, virtual currencies, and remote automation. Finally, it provides a brief overview of what a blog is and the early history of blogging.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

Week 15 17 Lesson

This document discusses several key IT trends, issues, and challenges. It covers the following trends: artificial intelligence and machine learning, edge computing and quantum computing, cybersecurity, blockchain, and virtual/augmented reality. It also discusses common types of malware like ransomware, spyware, trojans, and worms. Additionally, it covers issues around data security, big data, cloud computing, open source software, mobile payments, social media liabilities, wearable tech, the internet of things, virtual currencies, and remote automation. Finally, it provides a brief overview of what a blog is and the early history of blogging.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Lesson 12: IT trend, Issues and

Challenges
(Week 15)

Lesson 13: Making


Video Blog (VLOG)
(Week 16 & 17)
IT Trends
Five Trends in The Information Technology
• Artificial intelligence and machine learning

• Edge computing and quantum computing


(Cloud Computing)
• Cybersecurity
• Blockchain
• Virtual reality and augmented reality
1. Artificial Intelligence and Machine Learning
• Artificial Intelligence and Machine Learning have the potential to
change the future world and have been making headlines among
the emerging information technology trends in recent years

• Machine learning (ML) involves training machines to perform tasks


without being specifically programmed

• In contrast, artificial intelligence (AI) consists in building intelligent


machines capable of performing tasks that usually require human
wisdom.

• Artificial intelligence (AI) can generate human-like


interactions while using semantic techniques that improve
quality.
2. Edge Computing and Quantum Computing
• Edge computing is a distributed computing
framework that brings computation and data
storage closer to the data source.
• Using edge computing can strengthen businesses. It also
brings significant benefits such as faster insights, improved
response times, and enhanced bandwidth availability.

• In addition, implementing edge computing ensures data


security, which is crucial in today’s world as businesses are
prone to attacks from malicious hackers or other activities
online.
3. Cybersecurity
• Cybersecurity is now a growing trend in the information
technology industry
• Although cybersecurity crimes have alarmed major tech industries,
companies shouldn’t underestimate how critical it is to keep their network
security up to date.

• Nowadays, the majority of organizations are undergoing digital


transformation and making themselves vulnerable to data security threats
(hackers, viruses), Cybersecurity is the best solution for the protection of
their digital business data.

• The goal of cybersecurity is to avoid cyberattacks, including protecting


systems, networks, programs, devices, and data.
4. Blockchain
• The Blockchain is a digital register for recording information called blocks,
they are securely linked to each other using cryptography.

Cryptography is the study of secure communications techniques that allow


only the sender and intended recipient of a message to view its contents.

• Every block contains information about the previous block,


forming a chain, and each subsequent block reinforces the
previous one.

• Blockchain also helps maintain a user’s intellectual


property.
5. Virtual Reality (VR) And Augmented Reality (AR)

• Virtual reality (VR) and augmented reality (AR) have outstanding


potential in the future of marketing, gaming, education, e-
commerce, and several other fields. Both technologies provide an
immersive 3-D visual experience by combining the virtual and real
worlds.
 Augmented reality (AR) adds digital elements to an existing live view
by often using the camera on a smartphone

 Virtual reality (VR) is an experience that replaces a real-life


environment with a simulated environment.
THESE IT TRENDS CAN BE APPLIED IN THE
FOLLOWING:
1.Automation
2.Internet Banking
3.Mobile Apps
4.Education
5.Business
6.Health
• The Internet of Things (IoT) describes the network of physical
objects—“things”—that are embedded with sensors,
software, and other technologies for the purpose of
connecting and exchanging data with other devices and
systems over the internet.

• These devices range from ordinary household objects to


sophisticated industrial tools

• With more than 7 billion connected IoT devices today,


experts are expecting this number to grow to 10 billion by
2020 and 22 billion by 2025
Why is Internet of Things (IoT) so important?

• IoT has become one of the most important technologies of


the 21st century. Now that we can connect everyday
objects—kitchen appliances, cars, thermostats, baby
monitors—to the internet via embedded devices, seamless
communication is possible between people, processes, and
things.

• By means of low-cost computing, the cloud, big data,


analytics, and mobile technologies, physical things can
share and collect data with minimal human intervention. In
this hyperconnected world, digital systems can record,
monitor, and adjust each interaction between connected
things. The physical world meets the digital world—and they
cooperate.
What is industrial IoT?
Industrial IoT (IIoT) refers to the application of IoT technology in
industrial settings, especially with respect to instrumentation
and control of sensors and devices that engage cloud
technologies.

The following are some common uses for IoT:


Smart manufacturing
Connected assets and preventive and predictive
maintenance
Smart power grids
Smart cities
Connected logistics
Smart digital supply chains
ISSUES & CHALLENGES
Although technology is undoubtedly making out lives easier,
the ease of access to shared information presents a wide
range of legal implications for businesses.
1. DATA SECURITY
• Data security concerns posed by advances in technology and the
manner in which consumers, businesses and other organizations
use that technology will be a significant concern in the year ahead
2. BIG DATA
• computer and device users create over 2.5 quintillion bytes of
data daily! This is the world of Big Data.
• Technologies to analyze, use, and, in some cases,
commercialize such vast amounts of data are beginning to
be more widely deployed.
3. CLOUD COMPUTING
• Cloud computing continues to show great promise for major cost
savings for businesses and convenience for consumers
• Yet, as more software applications and other computing resources
are hosted and accessed online in the “cloud,” data privacy and
security risks are increasing, and contracting and licensing norms
are evolving and becoming more difficult to manage
4. OPEN SOURCE SOFTWARE
• Non-proprietary open source software applications offer many
benefits and costs savings, but compliance with open source
license terms can be tricky.
5. MOBILE PAYMENTS
• Several consumer surveys suggest that we keep better track of
our mobile devices than we do of our wallets, so the rapid spread
of mobile payments is no surprise
6. SOCIAL MEDIA RELATED LIABILITIES

• Widespread business use of social media tools means that companies must
maintain and communicate clear policies of acceptable practices and ensure
compliance with applicable terms

7. WEARABLE COMPUTING
• Google Glass, computer watches and other wearable computing devices push
the boundary of mobile computing even further than the still recent wonders of
smartphones and tablets.

8. THE INTERNET OF THINGS


• Electronic tagging and tracking of objects and people with bar codes, RFID
devices and other technologies and communicating the resulting data about
locations, movements and status – the so-called “Internet of Things” – is on the
cusp of becoming reality. While this technology may offer many benefits to
businesses and consumers, the privacy issues posed by the Internet of Things
are similar to the issues surrounding “Big Data.”
9. VIRTUAL CURRENCIES
• Offering convenience for many online transactions, virtual
currencies (such as Bitcoin) fill a growing marketplace niche.
• is stored in electronic wallets (e-wallets), and generally transacted
online.
• are digital representations of value that can exist only in electronic
form.

10. REMOTE AUTOMATION AND CONTROL


• The remotely automated, controlled and monitored “smart office”
and “smart home” – even smart cities – are now reality.
The 11 Most Common Types of Malwares (Baker,
2021
Ransomware is software that uses encryption to disable a
target’s access to its data until a ransom is paid
Fileless malware doesn’t install anything initially, instead, it
makes changes to files that are native to the operating
system, such as PowerShell or WMI.

Spyware collects information about users’ activities


without their knowledge or consent
Adware tracks a user’s surfing activity to determine which
ads to serve them
Trojan disguise itself as desirable code or software

Worms target vulnerabilities in operating systems to


install themselves into networks.

Virus is a piece of code that inserts itself into an


application and executes when the app is run

Keylogger is a type of spyware that monitors user


activity
WHAT IS BLOG?
A combination word from “web log,” a blog is a
Web page that serves as a publicly accessible
personal journal for an individual, or as a
communications platform for a business.

Typically updated daily, blogs often reflect the


personality of the author. Updates to a blog are
called “blog posts,” “posts,” or “entries.”
A BRIEF HISTORY OF BLOGGING
The earliest recorded website created to be
similar to a modern-day blog is thought to be
links.net, which was started in 1994 by Justin
Hall.
The website contained short posts with
shared links that gave visitors access to his
writing work and other websites. This led the
New York Times Magazine to label Hall as the
“founding father of personal bloggers.”
In 1998, online blogs were created to
quickly connect with their favorite news outlets
Justin Hall is an American to allow readers to connect with their favorite
journalist and entrepreneur, news outlets.
In 2001, Opera Software reported that close
best known as a pioneer
to 600 news sites allowed their visitors to leave
blogger. comments and interact with other readers in
Born: December 16, 1974 this new way of sharing. After 10 years of
(age 48 years), Chicago, constant growth, modern blogging was born.
Illinois, United States
CHARACTERISTICS OF A BLOG
 Blogs are generally ongoing personal or business journals where users
add content regularly to the website.

 Blogs can also be found based on products, companies, and services


while often providing focused industry insight and sharing the latest
news.

 Blogs contain chronologically ordered posts, based on the date they


were published from newest to oldest.

 The most recent posts sit at the top of the front page, and then older
posts continue down the page as your scroll or use a “load more”
feature on the page.

 Blog pages also frequently display a sidebar with links to archives,


categories, feature articles, and other posts to read.
WHAT IS A BLOG’S PURPOSE?
o Blogs can be used for numerous diverse objectives, both for
monetary and non-monetary goals.
o People may use blogs to promote their art or creative
writing or share information about a particular topic or
passion.
o Some create blogs to share their personal experiences and
stories with friends, family, and like-minded people who
share similar interests.
o Bloggers can also utilize their talents and interests to earn
income through online ads, sponsored posts, and affiliate
income.
o Businesses usually operate blogs to promote their products,
increase traffic and get customer feedback.
TYPES OF BLOGS
 Personal blogs are usually websites similar to an online diary that
people can share with the world.

 Countless personal blogs can include niche topics surrounding travel,


beauty, lifestyle, and even cooking.

 Many bloggers today also use video blogs called vlogs. They are
more popular via YouTube and Instagram, where people can post
about their everyday lives and share decor tips, recipes, and reviews
about someone else’s site, book, or products.

 There are also numerous news and digital media blogs that cover
current information on what is going on globally and can be based
on the opinions of those who run the blog.
BLOGGING SOFTWARE
Numerous blogging applications and platforms assist people with building a
blog website to create and share with others. Here are five of the most
common blog software programs that can be used to create blogs:
1. WordPress – The most widely used platform to build websites and blogs
allows users to create pages and posts to publish on the internet.
2. Wix.com – Offers a free hosting or paid self-hosting option for creators
allowing a simple drag and drop design for website builders.
3. Squarespace – An all-in-one solution for creating a website or blog,
including domain hosting, eCommerce, galleries, analytics, and 24/7
website support.
4. Medium – A blogging platform designed for blogging and social media
for users to write, share, and even monetize their posts and writing.
5. Tumblr – Simplifies blogging by allowing uploading posts available on any
device, offers a blogging platform for free, and enables users to share on
social media.
Thank you for your
cooperation!

Happy Vacation! 

You might also like