0% found this document useful (0 votes)
16 views

6 Emerging Technologies

The document outlines key topics for a training session on current IT trends, including Artificial Intelligence, Big Data, Blockchain, IoT, Virtual Reality, and the Metaverse. It provides definitions, components, applications, and challenges associated with each technology. The training aims to prepare participants for the SBIIT promotion exam by enhancing their understanding of these critical areas in IT.

Uploaded by

nik27s.sbi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

6 Emerging Technologies

The document outlines key topics for a training session on current IT trends, including Artificial Intelligence, Big Data, Blockchain, IoT, Virtual Reality, and the Metaverse. It provides definitions, components, applications, and challenges associated with each technology. The training aims to prepare participants for the SBIIT promotion exam by enhancing their understanding of these critical areas in IT.

Uploaded by

nik27s.sbi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

Pre-Examination

Training (Session –
V)
FOR CLERICAL TO TO (SYSTEMS) PROMOTION EXAM
SBIIT HYDERABAD
Agenda
Current trends in IT
Artificial Intelligence
Big Data
Block Chain
IOT
Metaverse
Virtual Reality
Cyber Security Concepts
UPI / WhatsApp Banking / Mobile Banking / Internet Banking
Artificial Intelligence
Definition:
Artificial Intelligence is the simulation of human
intelligence processes by machines, especially
computer systems.
Key Components:
Machine Learning, Natural Language
Processing, Robotics and Computer Vision, Data
& Big Data, Neural Networks and Deep learning
Example:
Virtual assistants like Siri & Alexa, ChatGPT,
Google Gemini, etc…
Components of AI: Machine
Learning
Machine learning is a subset of AI focused on developing algorithms that allow computers
to learn from and make decisions based on data. ML can be classified into three main
types:
Supervised Learning: The model is trained on labeled data, which means that each
training example is paired with an output label. This approach is used for tasks like
classification and regression.
Unsupervised Learning: The model is trained on unlabeled data and must find patterns
and relationships within the data. Clustering and association are common tasks.
Reinforcement Learning: The model learns by interacting with an environment and
receiving feedback through rewards or penalties, which is used in game playing and
robotics.
Components of AI: Neural
Networks and Deep Learning
Neural networks are computational models inspired by the human brain,
consisting of interconnected units (neurons) that process information in layers.
Deep learning, a subset of ML, involves neural networks with many layers
(deep neural networks), enabling advanced capabilities in image and speech
recognition, natural language processing, and more.
Components of AI: Natural
Language Processing (NLP)
NLP enables computers to understand, interpret, and respond
to human language.
Key tasks in NLP include text analysis, speech recognition, and
language generation.
Applications range from chatbots and virtual assistants to
sentiment analysis and machine translation.
Components of AI: Robotics
and Computer Vision
Robotics involves the design and use of robots to perform
tasks.
AI-powered robots are used in manufacturing, healthcare, and
service industries.
Computer vision, a field of AI, enables machines to interpret
visual information from the world, used in applications like facial
recognition, autonomous vehicles, and medical imaging.
Components of AI: Data and
Big Data
Data is the cornerstone of AI.
The advent of big data—large, complex datasets—has fueled AI
advancements by providing the necessary information to train
sophisticated models.
Sources of big data include social media, IoT devices, and
transactional records.
Types of Artificial
Intelligence
Narrow AI: AI systems designed for a specific task (e.g., email filtering, facial
recognition, voice assistants).
General AI: AI systems with general intelligence similar to human beings
(currently theoretical). Experts believe artificial general intelligence will occur
around 2050 / 2060
Superintelligent AI: AI that surpasses human intelligence (also theoretical).
Applications of AI
Healthcare: Diagnosing diseases, personalized treatment plans.
Finance: Credit scoring, fraud detection, algorithmic trading
Transportation: Autonomous vehicles, traffic management.
Entertainment: Personalized recommendations (Netflix, Spotify), video games.
Customer Service: Chatbots, virtual customer assistants.
In SBI, our ‘Analytics Department’ use AI for Lead Generation and other
Dashboards.
Big Data
Big Data refers to vast volumes of
structured and unstructured data that any
businesses generate on a day-to-day basis.
These data sets are so large and complex
that traditional data processing applications
often struggle to handle them effectively.
These massive sea of data has valuable
insights, patterns, and correlations, which
can be leveraged for strategic advantage.
Big Data
Key Characteristics:
Volume: Vast amounts of data.
Velocity: Rapid generation and processing of data.
Variety: Different forms of data (structured, unstructured, semi-
structured).
Importance:
Enables insights and drive decision-making.
Different Forms of Data
Structured Data: Examples: Text documents (blogs, news
articles), Images (photos, graphics), Audio
Organized and predefined format (rows &
(music, speech), Video, Social media posts
columns)
Semi Structured Data:
Easily searchable and analyzed by computers
Flexible format with some organization
Examples: Customer databases, Financial
records, Sensor data Often uses tags or markers to define data
elements
Unstructured Data:
Examples: XML files, JSON data, Email (with
No predefined format
headers and body)
Complex for computers to analyze directly
Where does this Big Data
come from?
Social Media: Platforms like Facebook, Twitter, and Instagram.
Internet of Things (IoT): Smart devices and sensors.
Transactional Data: Online transactions, banking records.
Web and Mobile Data: Browsing histories, app usage.
Machine-generated Data: Logs from servers, industrial equipment.
Blockchain
A blockchain is a distributed ledger
technology that enables the secure
recording of transactions across a
decentralized network of computers.
Unlike traditional centralized databases,
where data is stored on a single server
controlled by a central authority, blockchain
distributes data across a network of nodes,
making it transparent, immutable, and
resistant to tampering.
Components of Blockchain
1. Blocks:
A blockchain consists of a series of
blocks, each containing a list of
transactions.
These transactions could involve the
transfer of cryptocurrencies like Bitcoin
or Ether, digital assets, contracts, or
any other form of data.
2. Chain of Blocks:
Blocks are linked together in a
chronological order, forming a chain.
Each block contains a reference to the
previous block, creating a continuous
and unbroken sequence of
transactions.
Components
of Blockchain
3. Decentralized Network:
Blockchain operates on a
decentralized network of
nodes, where each node
stores a copy of the entire
blockchain.
 This decentralization
ensures that no single entity
has control over the
network, making it resilient
to censorship and single
points of failure.
Components of
Blockchain
4. Consensus Mechanisms:
Consensus mechanisms are protocols used to
achieve agreement among nodes on the validity
of transactions and the order in which they are
added to the blockchain.
Popular consensus mechanisms include
 Proof of Work (PoW)
 Proof of Stake (PoS)
 Delegated Proof of Stake (DPoS).
Components
of Blockchain
5. Cryptography:
Cryptography plays a crucial role
in securing the blockchain by
ensuring the integrity and
confidentiality of transactions.
Each block is cryptographically
linked to the previous block, and
transactions are secured using
cryptographic techniques such as
digital signatures and hash
functions.
Advantages / Disadvantages
of Blockchain Technology
Pros
• Data is Immutable (unchangeable)
• Transparency
• Free from censorship
• Traceability
• Lowers Transaction Fees
• Higher Security
Advantages / Disadvantages
of Blockchain Technology
Cons
• High Cost of Implementation
• High Energy usage
• Lower Performance (Transactions per second)
• Modifying Data is hard
• Private Key Recovery
• Prone to Illegal activity
How blockchain works?
1.Transaction Initiation: A user initiates a transaction by creating a digital
signature using their private key and broadcasting it to the network.
2.Transaction Verification: Nodes in the network validate the transaction by
verifying the digital signature and checking if the user has sufficient funds.
3.Block Formation: Valid transactions are grouped together into a block by
miners, who compete to solve complex mathematical puzzles. The first miner to
solve the puzzle adds the block to the blockchain.
4.Consensus: Other nodes in the network verify the newly added block and reach
a consensus on its validity. If the majority of nodes agree, the block is
permanently added to the blockchain.
5.Immutable Record: Once a transaction is added to the blockchain, it becomes
immutable and cannot be altered or deleted. This ensures the integrity and
transparency of the transaction history.
Internet of Things
IoT is about connecting devices that traditionally were not designed to be
connected to the internet.
These devices range from household appliances like refrigerators and air
conditioner to industrial machines and urban infrastructure components.
The purpose of these connections is to collect and exchange data, providing
real-time insights and automation capabilities that were previously unattainable.
Internet of
Things
The architecture of IoT typically involves four key
components:

1.Sensors/Devices: These gather data from the


environment or perform specific functions.

2.Connectivity: This involves transmitting the


collected data to the cloud or other devices via
networks like Wi-Fi, Bluetooth, or cellular networks.

3.Data Processing: Once the data reaches the


cloud or a centralized system, it is processed and
analyzed to extract valuable insights.

4.User Interface: The processed data is then made


accessible to users through applications or
dashboards, enabling them to make informed
decisions or control the devices remotely.
Applications of IoT
Smart Homes: IoT-enabled devices in homes include smart thermostats, lighting
systems, security cameras, and kitchen appliances. These devices can be controlled
remotely and can interact with each other to create a more comfortable, secure,
and energy-efficient living environment.
Healthcare: Wearable devices and remote monitoring systems allow for
continuous health tracking, leading to proactive healthcare management. IoT can
facilitate telemedicine, improve patient care, and streamline hospital operations.
Agriculture: IoT applications in agriculture, such as soil sensors and automated
irrigation systems, help optimize farming practices. These technologies enable
precision agriculture, leading to increased crop yields and resource conservation.
Applications of IoT
Industrial IoT (IIoT): In manufacturing, IoT enhances production processes
through predictive maintenance, real-time monitoring, and automation. This
leads to reduced downtime, lower operational costs, and improved product
quality.
Smart Cities: IoT technologies are pivotal in developing smart cities, where
they manage urban infrastructure like traffic systems, waste management, and
public safety. This results in more sustainable, efficient, and livable urban
environments.
IoT - Challenges and
Considerations
Despite its vast potential, IoT also presents several challenges:
Security and Privacy: As more devices connect to the
internet, the risk of cyberattacks increases. Ensuring robust
security measures and protecting user data privacy are critical
concerns.
Interoperability: With a multitude of devices and platforms in
the market, achieving seamless interoperability remains a
significant hurdle. Standardizing protocols and ensuring
compatibility are essential for a cohesive IoT ecosystem.
Scalability: Managing and analyzing the enormous volumes of
data generated by IoT devices can be daunting. Scalable
solutions that can handle big data efficiently are necessary to
realize the full potential of IoT.
Virtual Reality
Virtual Reality refers to a simulated
experience that can be similar to or
completely different from the real world.
It typically involves the use of VR
headsets, which cover the user’s eyes and
often include built-in motion sensors to
track head and body movements.
These headsets display a three-
dimensional, computer-generated
environment that users can interact with
using handheld controllers, gloves, or even
full-body suits equipped with sensors.
Virtual Reality - Key
Components
1.Head-Mounted Displays (HMDs): Devices like the
Oculus Rift, HTC Vive, and PlayStation VR that provide
immersive visual experiences.
2.Motion Tracking: Sensors and cameras that track the
user’s movements to allow interaction with the virtual
environment.
3.Haptic Feedback: Technology that provides tactile
responses to enhance the sense of immersion.
4.Audio Systems: Surround sound or spatial audio that
creates a realistic auditory experience.
Applications of Virtual
Reality
1.Entertainment and Gaming: VR has revolutionized the gaming
industry by offering immersive experiences that make players feel as if
they are part of the game world. VR arcades, immersive storytelling, and
virtual theme parks are expanding the horizons of digital entertainment.
2.Education and Training: VR provides interactive and engaging learning
experiences. In education, virtual field trips and immersive history lessons
bring subjects to life. For training, VR simulations offer safe environments
for practicing complex procedures, such as surgical operations or flight
training.
3.Healthcare: VR is used for pain management, physical therapy, and
mental health treatments. It provides therapeutic experiences for patients,
helps in the rehabilitation process, and is used in exposure therapy for
phobias and PTSD.
Applications of Virtual
Reality
4.Architecture and Real Estate: VR allows architects and real estate
developers to create and explore virtual models of buildings before they
are constructed. Clients can take virtual tours of properties, enhancing
the design and decision-making process.
5.Retail and Marketing: VR creates virtual shopping experiences where
customers can try products before purchasing. It also provides innovative
marketing solutions, allowing brands to create immersive advertisements
and experiences.
6.Social Interaction: Virtual social platforms enable people to interact in
shared virtual spaces. Applications like VRChat and AltspaceVR allow
users to meet, socialize, and collaborate in virtual environments,
breaking geographical barriers.
Virtual Reality
•Cost and Accessibility: High-quality VR systems can be expensive, limiting access
for many potential users. Continued advancements and reductions in cost are
essential for broader adoption.
•Motion Sickness: Some users experience discomfort or motion sickness when using
VR, which can limit the duration and enjoyment of VR experiences. Improving motion
tracking and reducing latency are ongoing areas of development.
•Content Development: Creating high-quality VR content requires significant
resources and expertise. Ensuring a steady stream of engaging content is crucial for
maintaining user interest.
•Privacy and Security: VR systems collect extensive data on user movements and
interactions. Safeguarding this data and ensuring user privacy are critical concerns.
•Physical Safety: Users can become disoriented or unaware of their physical
surroundings while immersed in VR, leading to potential accidents or injuries.
Designing safe VR environments and providing clear guidelines are important.
Metaverse – The
Digital Interaction
The metaverse is a collective
virtual shared space, created by
the convergence of virtually
enhanced physical reality and
physically persistent virtual space.
It encompasses a range of
technologies, including AR, VR,
and blockchain, facilitating a
multitude of activities from social
interaction and gaming to
commerce and education.
Metaverse – The Digital
Interaction
Key characteristics of the metaverse include:
1.Persistence: The metaverse continues to exist and evolve
even when individuals are not actively engaged with it.
2.Interoperability: Users can move seamlessly between
different virtual spaces and experiences within the metaverse.
3.User-Generated Content: The metaverse is largely shaped
by its users, who can create, own, and trade virtual assets and
experiences.
4.Real-Time Interactivity: Actions and interactions occur in
real time, providing a dynamic and responsive environment.
Metaverse –
Application/Potential
1.Social Interaction and Entertainment
2.Work and Collaboration
3.Education and Training
4.Commerce and Economy
5.Healthcare

You might also like