Emerging Note (C7) @NoteHeroBot
Emerging Note (C7) @NoteHeroBot
Contents
•
•
•
•
•
•
•
•
•
•
Objectives
•
–
–
–
–
–
–
–
–
Introduction
• From time to time, existing technologies are always
improved and new technologies are invented.
• Presently, there are lots of new technologies under
development including the IoT, AI, AR and Big Data
which are presented in the previous chapters’ of this
course
• This chapter will cover additional emerging
technologies which will have prominent impact in the
world or in human life.
Nanotechnology Overview
• Science, engineering, and technology conducted at the nanoscale, which
is about 1 to 100 nanometers.
• Nanoscience and nanotechnology
– are the study and application of extremely small things
– can be used across all the other science fields, such as chemistry, biology,
physics, materials science, and engineering
– involve the ability to see and to control individual atoms and
molecules.
• Everything on Earth is made up of atoms
– the food we eat, the clothes we wear, the buildings and houses we live in,
and our own bodies
– Atoms are the building blocks for all matter in our universe.
Nanotechnology Applications
1. Decentralization
– The information is not stored by one single entity
2. Transparency
– A person’s identity is hidden via complex cryptography and
represented only by their public address.
3. Immutability
– In the context of the blockchain, means that once something has
been entered into the blockchain, it cannot be tampered with.
Blockchain Technology Why?
• Cost saving
• High Speed and accessibility
• Back-up and restore data
• Automatic Software Integration
• Reliability
• Mobility
• Unlimited storage capacity
Quantum Computing Overview
• The next generation of computing using quantum physics.
– Quantum computers are big machines, need deep-freezing
• Currently, the only organization which provides a quantum computer in
the cloud is IBM.
– They allow free access to anyone who wishes to use their 5qubit
machine
• Google provided the fastest quantum computer with 53qubits and speed
of 200 seconds computation while the supercomputer took 10000
years.
– Qubit is short for a sequence of quantum bits (1, 0, or some value
between).
Quantum Computing Advantages
• For scientists to crunch very long numbers
• Help in the discovery of new drugs, by unlocking the complex structure
of chemical molecules.
• Other uses include
– financial trading
– risk management
– supply chain optimization
• Data transferred over the internet with much safer encryption
Autonomic Computing (AC) Overview
• Advantages
– Easily Customizable
– Low power consumption
– Low cost
– Enhanced performance
• Disadvantages
– High development effort
– Larger time to market
Embedded Systems Basic Structure
Cyber Security Overview
• Protection of computer systems from the theft of or damage
to their hardware, software, or electronic data, as well as from
the disruption or misdirection of the services they provide.
• Cyber crime an unlawful activity in which computer or
computing devices are used as a tool or/and target of criminal
activity
–committed by the people of destructive and criminal
mindset either for
• Revenge
• greed or adventure
Cyber Security Measures
• Staff awareness training
• Application security
• Network security
• Leadership commitment
• Password management
Cyber Security Types of Threats
• Ransomware: designed to extort money by blocking access to files or
the computer system until the ransom is paid.
• Malware:- designed to gain unauthorized access or to cause damage in
to a computer
• Social engineering: a tactic that adversaries use to trick you into
revealing sensitive information.
– it is the practice of sending fraudulent emails that resemble emails from
reputable sources.
– The aim is to steal sensitive data like credit card numbers and login information.
– It’s the most common type of cyber-attack
Cyber Security Benefits & Vendors
• Business protection against malware, ransomware, phishing, and
social engineering.
• Protection for data and networks.
• Prevention of unauthorized users.
• Improves recovery time after a breach.
• Protection for end-users.
• Improved confidence in the product for both developers and
customers.
– Vendors use endpoint, network and advanced threat protection
security as well as data loss prevention
– Known venders ➔ Cisco, McAfee, and Trend Micro
Additive Manufacturing Overview
(3D Printing)
• The construction of a three-dimensional object from a CAD
model or a digital 3D model.
• Additive manufacturing (AM) describes types of advanced
manufacturing that are used to
– Create three-dimensional structures out of plastics, metals,
polymers and other materials that can be sprayed through a
nozzle or aggregated in a vat.
Additive Manufacturing Overview…..
(3D Printing)
• These constructs are added layer by layer in real time based on
digital design.
• The simplicity and low cost of AM machines, combined with the
scope of their potential creations,
– could profoundly alter global and local economies and affect
international security.
Reading Assignment
What is the difference between additive manufacturing and 3D printing
?
33