0% found this document useful (0 votes)
27 views

Unit 1

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

Unit 1

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 33

DIGITAL TECHNOLOGY

1. Definition of digital technology


The definition of digital technology refers to digital devices,
systems, and resources that help create, store, and manage data.
An important aspect of digital technology is information
technology (IT) which refers to the use of computers to process
data and information.

Most businesses/organizations nowadays have an IT department


to manage the technical side of their organization, with activities
ranging from network and system administration to software
development, and security etc. So, what exactly are these
systems and why is digital technology important? Let's take a
look.
Can anyone tell me about Industrial Revolution?

So the first one—the one with steam power—that was the first industrial
revolution. It was followed by the age of science and mass production, and then
the digital revolution.

Digital ERA

We live in the age of data, where everything around us is connected to a data


source, and everything in our lives is digitally recorded. For instance, the current
Digital Technological world has a wealth of various kinds of data, such as the
Internet of Things (IoT) data, cyber security data, smart city data, business data,
smartphone data, social media data, health data, COVID-19 data, and many
more.

Digital Technology was started back in year 1950-1970’s


Digital technology has enabled businesses to store huge amounts
of data, and access and retrieve it whenever needed. Examples
AI, Social media are the best suitable example of Digital
Technology.
1.2. DIGITAL TECHNOLOGY.
 DT begins in the mid-nineteen century. Their techniques
were based on mathematical concepts suggested by the
seventeenth-century German mathematician, Gottfried
Wilhelm Leibniz, who proposed a binary computing system.
His innovation inspired such numerical codes as American
Standard Code for Information Interchange (ASCII) that
described objects with digits.
 Digital technology is a base two process. Digitized
information is recorded in binary code of combinations of the
digits 0 and 1, also called bits, which represent words and
images.
 Digital technology enables immense amounts of information
to be compressed on small storage devices that can be
easily preserved and transported. Digitization also quickens
data transmission speeds. Digital technology has
transformed how people communicate, learn, and work.
 Telecommunications has relied on digital methods to
transmit messages. In the early 1980s, enhanced fiber
optics enabled the development of digital communication
networks. Digital technology replaced analog signals for
many telecommunication forms, particularly cellular
telephone and cable systems. Analog-to-digital converters
utilized pulse code modulation (PCM) to change analog data
into digital signals. Compared to analog transmissions,
digitized signals were less distorted and could easily be
duplicated.
 In 1998, commercial digital television broadcasts premiered
in the United States. Communication satellites known as
direct broadcast satellite (DBS) transmitted compressed
digital signals for viewers to receive several hundred
television programming choices. Other forms of digital
information, including audio programs, were sent to
subscribers via satellite. The Federal Communications
Commission ordered all American broadcasts to be digital by
2010.
 Digital printing with electro-photographic and formatted data
technologies have altered how books and magazines are
published. The Library of Congress National Digital Library
Project has worked to preserve and expand access to rare
items. Copyright issues concerning digital technology have
addressed the copying of music and videos without
performers receiving royalties.
 The Electronic Numerical Integrator, and Calculator (ENIAC)
was often credited as the first electronic digital computer. A
1973 court ruling on patent infringement declared John V.
Atanasoff and Clifford E. Berry were the digital computer's
inventors and that the ENIAC had been derived from their
design.
 In the early 2000s, digital computers ranging from laptops to
Internet networks came in many sizes and performed various
tasks. Supercomputers performed complex mathematical
calculations analyzing vast amounts of data. The Digital Data
Broadcast System (DDBS) guided air-traffic control. Digital
radiography converted analog signals of x-rays to create
digital images. Digital information was stored on plastic disks
with pitted patterns of 1s and 0s that lasers translated. By
the early 2000s, digital cameras had transformed
photography by recording color and light intensities with
pixels. Also, digital compression of images and video was
achieved by Joint Photographic Experts Group (JPEG) and the
Moving Picture Experts Group (MPEG) codes. Animation had
often been digitized with some films and cartoons being
created entirely with computers
Question: Technically we know that from where the internet
cable will come from?
1.3. The Concepts of Cloud, Big Data, Digital
Marketing

What is Cloud?
The term Cloud refers to a Network or Internet. In other words, we
can say that Cloud is something, which is present at remote
location. Cloud can provide services over public and private
networks, i.e., WAN, LAN or VPN.
What is Cloud Computing?
Cloud Computing refers to manipulating,
configuring, and accessing the hardware and software resources
remotely.
Cloud computing offers platform independency, as the software is
not required to be installed locally on the PC.
It offers online data storage, infrastructure, and application.
Example Like Google drive,Drop Box, Amazon Prime and etc

Basic Concepts
There are certain services and models working behind the scene
making the cloud computing feasible and accessible to end users.
Following are the working models for cloud computing:
Deployment Models: Type of access
Service Models: Type of service

 Deployment Models
Deployment models define the type of access to the cloud, i.e.,
how the cloud is located? Cloud can have any of the four types of
access: Public, Private, Hybrid, and Community.
Public Cloud
The public cloud allows systems and services to be easily
accessible to the general public. Public cloud may be less secure
because of its openness.
Private Cloud
The private cloud allows systems and services to be accessible
within an organization. It is more secured because of its private
nature.
Community Cloud
The community cloud allows systems and services to be
accessible by a group of organizations.
Hybrid Cloud
The hybrid cloud is a mixture of public and private cloud, in which
the critical activities are performed using private cloud while the
non-critical activities are performed using public cloud.

 Service Models
Cloud computing is based on service models. These are
categorized into three basic service models which are -
 Infrastructure-as–a-Service (IaaS)
 Platform-as-a-Service (PaaS)
 Software-as-a-Service (SaaS)
Anything-as-a-Service (XaaS):
is yet another service model, which includes Network-as-a-
Service, Business-as-a-Service, Identity-as-a-Service, Database-
as-a-Service or Strategy-as-a-Service.
The Infrastructure-as-a-Service (IaaS):-
is the most basic level of service. Each of the service models
inherits the security and management mechanism from the
underlying model, as shown in the following diagram:
Infrastructure-as-a-Service (IaaS)
IaaS provides access to fundamental resources such as virtual
storage (physical machines, virtual machines), etc.
Platform-as-a-Service (PaaS)
PaaS provides the runtime environment for applications,
development and deployment tools, etc.
Software-as-a-Service (SaaS)
SaaS model allows to use software applications as a service to
end-users.

AD

1.3.1. Advantage and Disadvantages of Cloud


Computing
Advantages of Cloud Computing:
As we all know that Cloud computing is trending technology.
Almost every company switched their services on the cloud to rise
the company growth.
Here, we are going to discuss some important advantages of
Cloud Computing-
1) Back-up and restore data
Once the data is stored in the cloud, it is easier to get back-up
and restore that data using the cloud.
2) Improved collaboration
Cloud applications improve collaboration by allowing groups of
people to quickly and easily share information in the cloud via
shared storage.
3) Excellent accessibility
Cloud allows us too quickly and easily access store information
anywhere, anytime in the whole world, using an internet
connection. An internet cloud infrastructure increases
organization productivity and efficiency by ensuring that our data
is always accessible.
4) Low maintenance cost
Cloud computing reduces both hardware and software
maintenance costs for organizations.
5) Mobility
Cloud computing allows us to easily access all cloud data via
mobile.
6) I-Services in the pay-per-use model
Cloud computing offers Application Programming Interfaces (APIs)
to the users for access services on the cloud and pays the
charges as per the usage of service.
7) Unlimited storage capacity
Cloud offers us a huge amount of storing capacity for storing our
important data such as documents, images, audio, video, etc. in
one place.
8) Data security
Data security is one of the biggest advantages of cloud
computing. Cloud offers many advanced features related to
security and ensures that data is securely stored and handled.

1.3.2. Disadvantages of Cloud Computing


A list of the disadvantage of cloud computing is given below -
1) Internet Connectivity
As you know, in cloud computing, every data (image, audio,
video, etc.) is stored on the cloud, and we access these data
through the cloud by using the internet connection. If you do not
have good internet connectivity, you cannot access these data.
However, we have no any other way to access data from the
cloud.
2) Vendor lock-in
Vendor lock-in is the biggest disadvantage of cloud computing.
Organizations may face problems when transferring their services
from one vendor to another. As different vendors provide different
platforms, that can cause difficulty moving from one cloud to
another.
3) Limited Control
As we know, cloud infrastructure is completely owned, managed,
and monitored by the service provider, so the cloud users have
less control over the function and execution of services within a
cloud infrastructure.
4) Security
Although cloud service providers implement the best security
standards to store important information. But, before adopting
cloud technology, you should be aware that you will be sending
all your organization's sensitive information to a third party, i.e., a
cloud computing service provider. While sending the data on the
cloud, there may be a chance that your organization's information
is hacked by Hackers.

1.4. Cloud 9:
AWS Cloud9 is a cloud-based integrated development
environment (IDE) that lets you write, run, and debug your code
with just a browser. It includes a code editor, debugger, and
terminal. Cloud9 comes prepackaged with essential tools for
popular programming languages, including JavaScript, Python,
PHP, and more.
So we don’t need to install files or configure your development
machine to start new projects. Since your Cloud9 IDE is cloud-
based, you can work on your projects from your office, home, or
anywhere using an internet-connected machine.
Cloud9 also provides a seamless experience for developing server
less applications enabling you to easily define resources, debug,
and switch between local and remote execution of server less
applications. With Cloud9, you can quickly share your
development environment with your team, enabling you to pair
program and track each other's inputs in real time.

1.4.1. Benefits:
1) CODE WITH JUST A BROWSER
AWS Cloud9 gives you the flexibility to run your development
environment on a managed Amazon EC2 instance or any existing
Linux server that supports SSH. This means that you can write,
run, and debug applications with just a browser, without needing
to install or maintain a local IDE. The Cloud9 code editor and
integrated debugger include helpful, time-saving. And The Cloud9
terminal provides a browser-based shell experience enabling you
to install additional software

2) CODE TOGETHER IN REAL TIME


AWS Cloud9 makes collaborating on code easy. You can share
your development environment with your team in just a few clicks
and pair program together. While collaborating, your team
members can see each other type in real time, and instantly chat
with one another from within the IDE.
3) BUILD SERVERLESS APPLICATIONS WITH EASE
AWS Cloud9 makes it easy to write, run, and debug serverless
applications. It preconfigures the development environment with
all the SDKs, libraries, and plug-ins needed for serverless
development. Cloud9 also provides an environment for locally
testing and debugging AWS Lambda functions. This allows you to
iterate on your code directly, saving you time and improving the
quality of your code.
4) DIRECT TERMINAL ACCESS TO AWS
AWS Cloud9 comes with a terminal that includes sudo privileges
to the managed Amazon EC2 instance that is hosting your
development environment and a preauthenticated AWS
Command Line Interface. This makes it easy for you to quickly run
commands and directly access AWS services.
5) START NEW PROJECTS QUICKLY
AWS Cloud9 makes it easy for you to start new projects. Cloud9’s
development environment comes prepackaged with tooling for
over 40 programming languages, including Node.js, JavaScript,
Python, PHP, Ruby, Go, and C++. This enables you to start writing
code for popular application stacks within minutes by eliminating
the need to install or configure files, SDKs, and plug-ins for your
development machine. Because Cloud9 is cloud-based, you can
easily maintain multiple development environments to isolate
your project’s resources.

1.4.2. Features:
1) Fully-featured Editor
AWS Cloud9 includes a browser-based editor that makes it easy
to write, run, and debug your projects. As you type, code
completion and code hinting suggestions appear in the editor,
helping you code faster and avoid errors
2) Broad Selection of Run Configurations
AWS Cloud9 supports over 40 programming languages and
application types including JavaScript, Python, PHP, Ruby, Go, and
C++. With Cloud9, you can either choose from the default run
configurations or define custom configurations by specifying
environment variables, filenames, command line options, etc.
3) Integrated Debugger
AWS Cloud9 comes with an integrated debugger, which provides
commonly used capabilities like setting breakpoints, stepping
through code, and inspecting variables of any PHP, Python,
JS/Node.js, C/C++ app.
4) Integrated Tools for Serverless Development
AWS Cloud9 allows you to easily build serverless applications by
providing an integrated experience to get started, write, and
debug serverless application code. Cloud9 also supports the
Serverless Application Model (SAM) so you can use SAM templates
in Cloud9 to provide a simplified way of defining resources for
your serverless applications.
5) Connectivity to Any Linux Server Platform
You have the flexibility to run AWS Cloud9 development
environments on a managed Amazon EC2 Linux instance or any
Linux server that you are using today.
6) Continuous Delivery Toolchain
AWS Cloud9 integrates with AWS CodeStar, allowing you to
quickly setup an end-to-end continuous delivery toolchain for your
application and start releasing code faster on AWS. CodeStar
provides a unified experience that enables you to easily build,
test, and deploy applications to AWS with the help of AWS
CodeCommit,
7) Built-in Terminal
AWS Cloud9 provides a terminal that has full sudo privileges to
your managed Amazon EC2 instance. It enables you to run
commands, such as pushing code changes to git, compiling your
code, or displaying command output from your servers.

1.5. Social Media & Digital Marketing


Social media marketing can be termed as a marketing strategy
that is used to promote a product and develop an influential
relationship with the customers via different Social Media
platforms.

Social media is a platform that is termed as simple as where users


come and share content such as messages, videos, etc.
But this is more than it seems social media marketing helps to
establish a relationship with the customer and make the presence
of marketers on the web.
Three modes are primarily used Blogs, social networks, and
forums are used for this.

Social media marketing can be achieved by:-


1) Start making a connection with the community
2) Then sharing valuable content with them.
3) The next way is by doing advertisements on social media
known as sponsor’s ads.

1.5.1. Advantages of Social Media Marketing:


Cost-Effective: Social media platforms offer cost-effective
advertising options that can help small businesses reach a larger
audience without breaking the bank.
Increased Brand Awareness: Social media platforms allow
businesses to reach a wider audience and increase brand
awareness by engaging with customers and sharing relevant
content.
Increased Customer Engagement: Social media platforms provide
a platform for businesses to engage with their customers and
build relationships, which can lead to increased customer loyalty
and retention.
Targeted Advertising: Social media platforms offer advanced
targeting options that allow businesses to reach specific
demographics and target customers based on their interests,
behaviors, and location.
1.5.2. Disadvantages of Social Media Marketing:
Time-Consuming: Social media marketing requires consistent
effort and time to create and curate content, engage with
customers, and monitor metrics.
Limited Control: Social media platforms are third-party platforms,
and businesses have limited control over changes in algorithms
and policies that can impact their marketing efforts.
Negative Feedback: Social media platforms allow customers to
leave negative feedback publicly, which can damage a business’s
reputation if not handled appropriately.
Limited Reach: Despite advanced targeting options, social media
platforms may have a limited reach compared to other digital
marketing channels.

1.6. Digital Marketing:


Digital Marketing can be termed as a marketing strategy that
is used to promote a product and develop an influential
relationship with the customers via all digital and offline
sources.

Digital marketing is creating awareness about the product


using digital channels. Digital channel uses the internet and
the methods which are used by digital marketing are
SEO&SEM Search Engline (Optimization,Marketing) E-
commerce, and Email marketing. Offline sources use radio,
SMS, and television for marketing.
When we use this strategy there are three different
components which are Online marketing, Mobile marketing,
and Social media marketing. This also focuses on the public
likes as what is trending and how it is to be delivered to the
consumer.

1.6.1. Advantages of Digital Marketing:


 Cost-Effective: Digital marketing offers a cost-effective way
for businesses of all sizes to reach a larger audience and
increase brand awareness.
 Advanced Targeting Options: Digital marketing offers
advanced targeting options that allow businesses to reach
specific demographics and target customers based on their
interests, behaviors, and location.
 Measurable Results: Digital marketing provides real-time
data and analytics that allow businesses to track the
effectiveness of their campaigns and make data-driven
decisions.
 Flexibility: Digital marketing offers a variety of channels,
including search engine optimization, pay-per-click
advertising, email marketing, and more, allowing
businesses to tailor their approach to their specific needs
and goals.
1.6.2. Disadvantages of Digital Marketing:
 Limited Personalization: Digital marketing can sometimes
lack the personalization and human touch that traditional
marketing methods offer.
 Increased Competition: Digital marketing is highly
competitive, and businesses must continually adapt and
innovate to stay ahead of the competition.
 Overwhelming: The vast array of digital marketing
channels and tactics can be overwhelming, and businesses
may struggle to determine the most effective approach for
their specific needs.
 Ad-Blockers: Ad-blockers can limit the effectiveness of
digital marketing efforts, as customers may not see the
ads.

1.6.3. Similarity between Social And Digital


Marketing?

1.7. Block Chain:


Block chain sometimes referred to as distributed ledger
technology (DLT), makes the history of any digital asset
unalterable and transparent through the use of a
decentralized network and cryptographic hashing.
A simple analogy for how blockchain technology operates can
be compared to how a Google Docs document works. When
you create a Google Doc and share it with a group of people,
the document is simply distributed instead of copied or
transferred. This creates a decentralized distribution chain
that gives everyone access to the base document at the
same time.
No one is locked out awaiting changes from another party,
while all modifications to the document are being recorded in
real-time, making changes completely transparent.
A significant gap to note however is that unlike Google Docs,
original content and data on the blockchain cannot be
modified once written, adding to its level of security.
Of course, blockchain is more complicated than a Google
Doc, but the analogy is apt because it illustrates critical ideas
of the technology

1.7.1. Why Is Blockchain Important


Blockchain is an especially promising and revolutionary
technology because it helps reduce security risks, stamp out
fraud and bring transparency in a scalable way.

Popularized by its association with cryptocurrency and NFTs,


blockchain technology has since evolved to become a
management solution for all types of global industries. Today,
you can find blockchain technology providing transparency
for the food supply chain, securing healthcare
data, innovating gaming and overall changing how we handle
data and ownership on a large scale.

1.7.2. How Does Blockchain Work


For proof-of-work blockchains, this technology consists of
three important concepts: blocks, nodes and miners.

1.7.3. What Is a Block


Every chain consists of multiple blocks and each block has
three basic elements:

 The data in the block.


 The nonce — “number used only once.” A nonce in
blockchain is a whole number that’s randomly
generated when a block is created, which then
generates a block header hash.
 The hash — a hash in blockchain is a number
permanently attached to the nonce. For Bitcoin
hashes, these values must start with a huge number
of zeroes (i.e., be extremely small).

When the first block of a chain is created, a nonce generates


the cryptographic hash. The data in the block is considered
signed and forever tied to the nonce and hash unless it is
mined.

1.7.4. What Is a Miner in Blockchain


Miners create new blocks on the chain through a process
called mining.

In a blockchain every block has its own unique nonce and


hash, but also references the hash of the previous block in
the chain, so mining a block isn't easy, especially on large
chains.

Miners use special software to solve the incredibly complex


math problem of finding a nonce that generates an accepted
hash. Because the nonce is only 32 bits and the hash is 256,
there are roughly four billion possible nonce-hash
combinations that must be mined before the right one is
found. When that happens miners are said to have found the
"golden nonce" and their block is added to the chain.

Making a change to any block earlier in the chain requires re-


mining not just the block with the change, but all of the
blocks that come after. This is why it's extremely difficult to
manipulate blockchain technology. Think of it as "safety in
math" since finding golden nonces requires an enormous
amount of time and computing power.

When a block is successfully mined, the change is accepted


by all of the nodes on the network and the miner is rewarded
financially
1.7.5. Blockchain Applications
Blockchain isn’t only used for financial transactions. Due to
its secure and transparent nature, the technology is versatile
to needs beyond one area of expertise. Industries covering
energy, logistics, education and more are utilizing the
benefits of blockchain every day.

1.7.6. TOP BLOCKCHAIN USES & APPLICATIONS


 Cryptocurrency
 Cybersecurity
 Accounting and record keeping
 Supply chain
 Healthcare

1.7.7. HOW DOES CRYPTOCURRENCY WORK


Cryptocurrencies are digital currencies that use blockchain
technology to record and secure every transaction. A
cryptocurrency (Bitcoin, for example) can be used as a digital
form of cash to pay for everyday items as well as larger
purchases, like cars and homes. It can be bought using one of
several digital wallets or trading platforms, then digitally
transferred upon purchase of an item, with the blockchain
recording the transaction and the new owner. The appeal of
cryptocurrencies is that everything is recorded in a public
ledger and secured using cryptography, making an
irrefutable, timestamped and secure record of every
payment.

1.7.8. History of Blockchain


Although blockchain is a relatively new technology, it already
boasts a rich and interesting history. The following is a brief
timeline of some of the most important and notable events in
the development of blockchain.
Blockchain Evolution
The first concept of blockchain dates back to 1991, when the
idea of a cryptographically secured chain of records, or
blocks, was introduced by Stuart Haber and Wakefield Scott
Stornetta. Two decades later the technology gained traction
and widespread use. The year 2008 marked a pivotal point
for blockchain, as Satoshi Nakamoto gave the technology an
established model and planned application. The first
blockchain and cryptocurrency officially launched in 2009,
beginning the path of blockchain’s impact across the tech
sphere.

2008
Satoshi Nakamoto, a pseudonym for a person or group,
publishes “Bitcoin: A Peer to Peer Electronic Cash System.”
2009
The first successful Bitcoin (BTC) transaction occurs between
computer scientist Hal Finney and the mysterious Satoshi
Nakamoto.
2010
Florida-based programmer Laszlo Hanycez completes the first
ever purchase using Bitcoin — two Papa John’s pizzas.
Hanycez transferred 10,000 BTCs, worth about $60 at the
time.
The market cap of Bitcoin officially exceeds $1 million.
2011
1 BTC = 1 USD, giving the cryptocurrency parity with the US
dollar.
Electronic Frontier Foundation, Wikileaks and other
organizations start accepting Bitcoin as donations.
2012
Blockchain and cryptocurrency are mentioned in popular
television shows like The Good Wife, injecting blockchain into pop
culture.
Bitcoin Magazine launched by early Bitcoin developer Vitalik
Buterin.
2013
BTC market cap surpassed $1 billion.
Bitcoin reached $100/BTC for the first time.
Buterin publishes the “Ethereum Project” paper, suggesting that
blockchain has other possibilities besides Bitcoin (like smart
contracts).
2014
Companies Zynga, The D Las Vegas Hotel and Overstock.com
all start accepting Bitcoin as payment.
Buterin’s Ethereum Project is crowdfunded via an Initial Coin
Offering (ICO) raising over $18 million in BTC and opening up
new avenues for blockchain.
R3, a group of over 200 blockchain firms, is formed to
discover new ways blockchain can be implemented in
technology.
PayPal announces Bitcoin integration.
The first-known NFT is minted
2015
Number of merchants accepting BTC exceeds 100,000.
NASDAQ and San-Francisco blockchain company Chain team
up to test the technology for trading shares in private
companies.
2016
Tech giant IBM announces a blockchain strategy for cloud-
based business solutions.
The government of Japan recognizes the legitimacy of
blockchain and cryptocurrencies.
2017
Bitcoin reaches $1,000/BTC for the first time.
Cryptocurrency market cap reaches $150 billion.
JP Morgan CEO Jamie Dimon says he believes in blockchain as
a future technology, giving the ledger system a vote-of-
confidence from Wall Street.
Bitcoin reaches its all-time high at $19,783.21/BTC.
Dubai announces its government will be blockchain-powered
by 2020.
2018
Facebook commits to starting a blockchain group and also
hints at the possibility of creating its own cryptocurrency.
IBM develops a blockchain-based banking platform with large
banks like Citi and Barclays signing on.
2019
China’s President Ji Xinping publicly embraces blockchain as
China’s central bank announces it is working on its own
cryptocurrency.
Twitter & Square CEO Jack Dorsey announces that Square will
be hiring blockchain engineers to work on the company’s
future crypto plans.
The New York Stock Exchange (NYSE) announces the creation
of Bakkt - a digital wallet company that includes crypto
trading.
2020
BTC almost reaches $30,000 by the end of 2020.
PayPal announces it will allow users to buy, sell and hold
cryptocurrencies.
The Bahamas becomes the world’s first country to launch its
central bank digital currency, fittingly known as the “Sand
Dollar.”
Blockchain becomes a key player in the fight against COVID-
19, mainly for securely storing medical research data and
patient information.
2021
Bitcoin surpasses $1 trillion in market value for the first time.
Popularity for the implementation of Web3 rises.
El Salvador becomes first nation to adopt Bitcoin as legal
tender.
Tesla buys $1.5 billion in BTC, becoming the first car
manufacturer to accept Bitcoin as a form of automobile
payment.
The metaverse, a virtual environment incorporating blockchain
technology, garners mainstream attention.
2022
Cryptocurrency loses $2 trillion in market value, due to
economic inflation and rising interest rates.
Google launches a dedicated Digital Assets Team to provide
customer support on blockchain-based platforms.
The U.K. government proposes safeguards
for stablecoin holders.
Popular video game Minecraft bans blockchain technologies
and NFT use in its game.

1.8. BIG-Data
We are living in the era of digital data technology, where
there are many different kinds of data are present. Such
outbreaks of data are relatively new. This is because now,
each user and organization can store the information in
digital form. So, for handling these exponential increases of
data, there should be some mechanism and approach.
Big Data is one way to handle such. In this section, we will
learn about what is Big Data, Its usage and importance and
its contribution to large-scale data handling.

1.8.1. What is Big Data:


Big data can be defined as a concept used to describe a large
volume of data, which are both structured and unstructured,
and that gets increased day by day by any system or
business. However, it is not the quantity of data, which is
essential. The important part is what any firm or organization
can do with the data matters a lot. Analysis can be performed
on big data for insight and predictions, which can lead to a
better decision.
1.8.2.
Use of Big Data: with the appropriate tools one can analyze
and assess production, customer feedback and returns, and
other factors to reduce outages and anticipate future
demands. Big data can also be used to improve decision-
making in line with current market demand

1.8.3. What are big data tools?


A big data tool is software that extracts information from
various complex data types and sets, and then processes
these to provide meaningful insights.
Traditional databases cannot process huge data hence best
big data tools that manage big data easily are used by
businesses.
Examples Hadoop,Tableau,MAngodb etc

1.8.4. Concept of 3V’s:


This conception theory gained thrust in the early 2000s when
trade and business analyst Mr. Doug Laney expressed the
mainstream explanation of the keyword big data over the
pillars of 3v's:

 Volume: Organizations and firms gather as well as pull


together different data from different sources, which
includes business transactions and data, data from
social media, login data, as well as information from the
sensor as well as machine-to-machine data. Earlier,
this data storage would have been an issue - but
because of the advent of new technologies for
handling extensive data with tools like Apache
Spark, Hadoop, the burden of enormous data got
decreased.
 Velocity: Data is now streaming at an exceptional
speed, which has to be dealt with suitably. Sensors,
smart metering, user data as well as RFID tags are
lashing the need for dealing with an inundation of data
in near real-time.
 Variety: The releases of data from various systems
have diverse types and formats. They range from
structured to unstructured, numeric data of traditional
databases to non-numeric or text documents, emails,
audios and videos, stock ticker data, login data,
Blockchain' encrypted data, or even financial
transactions.
1.8.5. Types of Big Data: The data generated in
bulk amount with high velocity and Variety can
be categorized as:

1. Structured Data: These are relational data.


2. Semi-structured Data: example: XML, JSON data.
3. Unstructured Data: Data of different formats: document
files, multimedia files, images, backup files, etc.

1. Structured data

Structured data is data whose elements are addressable


for effective analysis. It has been organized into a
formatted repository that is typically a database. It
concerns all data which can be stored in database SQL in a
table with rows and columns. They have relational keys
and can easily be mapped into pre-designed fields. Today,
those data are most processed in the development and
simplest way to manage information. Example: Relational
data.

2. Semi-Structured data

Semi-structured data is information that does not reside in


a relational database but that has some organizational
properties that make it easier to analyze. With some
processes, you can store them in the relation database (it
could be very hard for some kind of semi-structured data),
but Semi-structured exist to ease space. Example:XML-
data,

3. Unstructured data

Unstructured data is a data which is not organized in a


predefined manner or does not have a predefined data
model, thus it is not a good fit for a mainstream relational
database. So for Unstructured data, there are alternative
platforms for storing and managing, it is increasingly
prevalent in IT systems and is used by organizations in a
variety of business intelligence and analytics
applications. Example: Word, PDF, Text, Media logs.

As you know, the concept of big data is a clustered


management of different forms of data generated by various
devices (Android, iOS, etc.), applications (music apps, web
apps, game apps, etc.), or actions (searching through SE,
navigating through similar types of web pages, etc.). Here is
the list of some commonly found fields of data that come
under the umbrella of Big Data:

 Black Box Data: Black box data is a type of data that is


collected from private and government helicopters,
airplanes, and jets. This data includes the capture of
Flight Crew Sounds, separate recording of the
microphone as well as earphones, etc.
 Stock Exchange Data: Stock exchange data includes
various data prepared about 'purchase' and 'selling' of
different raw and well-made decisions.
 Social Media Data: This type of data contains information
about social media activities that include posts
submitted by millions of people worldwide.
 Transport Data: Transport data includes vehicle models,
capacity, distance (from source to destination), and the
availability of different vehicles.
 Search Engine Data: Retrieve a wide variety of
unprocessed information that is stored in SE databases.
There are various other types of data that gets generated in
bulk amount from applications and organizations.
1.9. Artificial Intelligence

AI is a wide-ranging branch of computer science concerned


with building smart machines capable of performing tasks
that typically require human intelligence.

Broadly speaking, artificially intelligent systems can perform


tasks commonly associated with human cognitive functions
— such as interpreting speech, playing games and identifying
patterns.

They typically learn how to do so by processing massive


amounts of data, looking for patterns to model in their own
decision-making. In many cases, humans will supervise an
AI’s learning process, reinforcing good decisions and
discouraging bad ones.

1.9.1. Strong AI Vs. Weak AI

Intelligence is tricky to define, which is why AI experts


typically distinguish between strong AI and Weak AI
Strong AI :

Strong AI, also known as artificial general intelligence, is a


machine that can solve problems it’s never been trained to
work on — much like a human can. This is the kind of AI we
see in movies. But this type of AI doesn’t actually exist yet.
Weak AI
Weak AI, sometimes referred to as narrow AI or specialized
AI, operates within a limited context and is a simulation of
human intelligence applied to a narrowly defined problem
(like driving a car, transcribing human speech or curating
content on a website).
Weak AI is often focused on performing a single task
extremely well. While these machines may seem intelligent,
they operate under far more constraints and limitations than
even the most basic human intelligence.

Weak AI examples include:


 Siri, Alexa and other smart assistants
 Self-driving cars
 Google search
 Conversational bots
 Email spam filters
 Netflix’s recommendations.

1.9.2. Benefits of AI
• Automation:AI can automate workflows and processes
or work independently and autonomously from a human
team.

Reduce human error: AI can eliminate manual errors


in data processing, analytics, assembly in
manufacturing, and other tasks through automation and
algorithms that follow the same processes every single
time.

• Eliminate repetitive tasks: AI can be used to perform


repetitive tasks, freeing human capital to work on higher
impact problems. AI can be used to automate processes,
like verifying documents, transcribing phone calls etc.

• Fast and accurate: AI can process more information


more quickly than a human, finding patterns and
discovering relationships in data that a human may
miss.

• Infinite availability: AI is not limited by time of day,


the need for breaks, or other human encumbrances.
When running in the cloud, AI and machine learning can
be “always on,”.

Applications and use cases for artificial intelligence


 Speech recognition: Automatically convert spoken
speech into written text.
 Image recognition: Identify and categorize various
aspects of an image
 Translation: Translate written or spoken words from
one language into another.
 Predictive modeling :Mine data to forecast specific
outcomes with high degrees of granularity.
 Data analytics: Find patterns and relationships in data
for business intelligence.
 Cybersecurity: Autonomously scan networks for cyber
attacks and threats.

1.10. What Is IoE?

The term Internet of Things has been around since 1999 but
it is more recently that discussions about what it is (and isn't)
are becoming more prevalent. There is often confusion
between the terms Internet of Things (IoT) and Internet
of Everything (IoE).
The "Internet of Things” has recently been added to the
Oxford dictionary, which defines it as “a proposed
development of the Internet in which everyday objects have
network connectivity, allowing them to send and receive
data.”
But the "Internet of Everything" goes much further. While the
IoT is about objects (things), the IoE has four dimensions —
people, process, data, and things.
It is basically a philosophy in which our technology future is
composed of different types of appliances, devices, and
things connected to the global internet.
As of now, the internet connection is only restricted to
phone/Tablets, PCs, and a handful of other devices but the
idea behind IoE is that in the future, machines will become
more intelligent and cognitive by having more access to data
and expanded network opportunities.

So, what is the Internet of Everything in simple terms? The


Internet of Everything is the connections between people,
things, data and processes combined into a common
interrelated system, the aim of which is to improve
experiences and make smarter decisions.

The IoE philosophy depicts the world in which billions of


sensors are implanted into billions of devices, machines and
ordinary objects, giving those expanded networking
opportunities, thus making them smarter.
What does IoE mean for businesses, governments and
individuals? The main goal of the IoE technology is to convert
collected information into actions, facilitate data-based
decision-making and provide new capabilities and richer
experiences.
1.10.1. IoE Features
 Decentralization and moving to the edge — data is
processed not in a single center, but in numerous distributed
nodes
 Data input and output — external data can be put into
devices and given back to other components of the network
 Relation to every technology in the process of digital
transformation — cloud computing, fog computing, AI, ML,
IoT, Big Data, etc. Actually, a rise in Big Data and the IoE
technology development are interconnected

1.10.2. Components of IoE


Key components of the IoE market are hardware, software
and services. As for constituent elements of the Internet of
Everything, there are four of them:
People
People provide their personal insights via websites,
applications or connected devices they use (such as social
networks, healthcare sensors and fitness trackers); AI
algorithms and other smart technologies analyze this data to
“understand” human issues and deliver relevant content
according to their personal or business needs that helps them
quickly solve issues or make decisions.
Things
Here we encounter the pure IoT concept. Various physical
items embedded with sensors and actuators generate data
on their status and send it to the needed destination across
the network.
Data
The raw data generated by devices has no value. But once it
is summarized, classified and analyzed, it turns into priceless
information that can control various systems and empower
intelligent solutions.
Processes
Different processes based on artificial intelligence, machine
learning, social networks or other technologies ensure that
the right information is sent to the right person at the right
time. The goal of processes is to guarantee the best possible
usage of Big Data.
1.10.3. Internet of Everything vs. Internet of
Things
To avoid the confusion between the terms, IoT vs. IoE, let’s
figure out in what ways they differ.
The core difference between the Internet of Things and the
Internet of Everything is the number of pillars for these
concepts:
IoT focuses on physical objects only
IoE encompasses four components (things, processes, data
and people)
The IoT, in essence, is the interconnectivity of physical
objects that send and receive data, while the IoE is a wider
term that includes, apart from IoT, numerous technologies
and people as the end-nodes.

Although IoT and IoE are different terms, there are also
some similarities between them:
Decentralization — both systems are distributed and don’t
have a single center; each node works as a small
management center and is able to perform certain tasks
independently
Security issues — distributed systems are still highly
vulnerable to penetration and cyberattacks; the more devices
are connected to the network, the higher the susceptibility to
breaches
On the one hand, decentralization is one of the IoE and IoT
advantages, since the whole system doesn’t fail even if there
are problems in a couple of nodes. On the other has, such a
distribution causes disadvantages in the form of threats for
data security and personal privacy.
1.10.4. Immersive Technology.
Immersive technologies create distinct experiences by
merging the physical world with a digital or simulated reality.
Augmented reality (AR) and virtual reality (VR) are two
principal types of immersive technologies. These
technologies share many of the same qualities.
However, AR blends computer-generated information onto
the user’s real environment, while VR uses computer-
generated information to provide a full sense of immersion.
1.10.5. Augmented Reality Overview
AR relies on processors, a display, sensors and input devices
to create an experience. There are four types of AR:
Marker-based AR uses a visual marker, like a QR code, to
produce a result. For example, Snapchat uses marker-based
AR to help its users add people to their contact lists.
Markerless AR uses GPS or a digital compass, velocity meter
or accelerometer to provide data. Google Maps Live View
uses markerless AR to navigate users to their destination.
Projection-based AR projects artificial light onto surfaces. For
example, researchers at the Digital Nature Group used lasers,
mirrors and cameras to create a hologram-like experience,
which can be felt by the user.
Superimposition partially or fully replaces the original view of
an object with a new view. IKEA and GOAT are two companies
taking advantage of this technology. IKEA allows users to
preview furniture in their house on their smartphone, while
GOAT enables users to use their smartphone to superimpose
the latest sneakers on their feet.
1.10.6. Virtual Reality Overview
VR systems use head-mounted displays and input devices to
provide a sense of immersion. Head-mounted displays cover
the user’s field of view to display computer-generated
content. Input devices such as joysticks, tracking balls,
controller balls and data gloves allow the user to interact with
the virtual environment. Just like AR, there are different types
of VR for different use cases:
In non-immersive VR, only a subset of a user’s senses is
stimulated, allowing the user to maintain awareness of the
physical environment outside of the virtual reality. For
example, the HP Reverb Pro headset allows designers to
create 3D models.
Semi-immersive VR leverages more senses than non-
immersive VR, but still does not take advantage of all senses.
For example, flight simulation allows pilots to learn how to fly
different aircrafts through realistic displays that simulate
different in-flight experiences.
Finally, fully-immersive VR stimulates all of the user’s senses.
For example, Infinadeck has created an omnichannel
treadmill that allows users to move within a virtual
environment.

You might also like