Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
16 views26 pages

Chapter 7

The document discusses various emerging technologies, including blockchain, cloud computing, computer vision, and cybersecurity. It outlines the fundamental principles and applications of each technology, emphasizing their significance and potential benefits. Key features such as decentralization in blockchain, the types of cloud computing services, and the importance of cybersecurity measures are highlighted.

Uploaded by

biniapa753
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views26 pages

Chapter 7

The document discusses various emerging technologies, including blockchain, cloud computing, computer vision, and cybersecurity. It outlines the fundamental principles and applications of each technology, emphasizing their significance and potential benefits. Key features such as decentralization in blockchain, the types of cloud computing services, and the importance of cybersecurity measures are highlighted.

Uploaded by

biniapa753
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

1

CHAPTER 7

Other Emerging Technologies

• Block chain technology


• Cloud computing
• Computer vision
• Cyber security
1. Blockchain Technology
2

 Blockchain is a growing list of records, called blocks, that


are linked using cryptography.
 A blockchain is a time-stamped series of immutable
records of data that is managed by a cluster of computers
not owned by any single entity.
 “Blocks” on the blockchain are made up of digital pieces
of information.
 Blocks store information about transactions like the date, time,
and dollar amount of your most recent transaction.
 Blocks store information about who is participating in
transactions.
 Blocks store information that distinguishes them from other
blocks.
Cont…
3

 In order for a block to be added to the


blockchain, four things must happen:
1. A transaction must occur.
2. That transaction must be verified.
3. That transaction must be stored in a block.
4. That block must be given a hash.
 Thus, blockchain is "an open, distributed
ledger that can record transactions
between two parties efficiently and in a
verifiable and permanent way".
 For use as a distributed ledger, a blockchain
is typically managed by a peer-to-peer
network collectively adhering to a protocol for
Three Pillars of Blockchain Technology
4

The three main properties of Blockchain


Technology are:
1. Decentralization
 The information is not stored by one single
entity.
2. Transparency
 Most interesting and no misunderstood
concepts in blockchain technology.
3. Immutability
 Once something has been entered into the
blockchain, it cannot be tampered with.
Cont…
5

 The reason why the blockchain has gained so much


admiration is that:
 It is not owned by a single entity, hence it is decentralized.
 The data is cryptographically stored inside
 The blockchain is immutable, so no one can tamper with the data
that is inside the blockchain.
 The blockchain is transparent so one can track the data if they
want
Application of blockchain
6

 File storage
 The sharing economy
 Crowdfunding
 Governance
 Supply chain auditing
 Cryptocurrencies
 Finance
 Voting Systems
2. Cloud Computing
7
 Cloud computing is a means of networking remote servers that are
hosted on the Internet.
 Rather than storing and processing data on a local server, or a PC's
hard drive, one of the following three types of cloud
infrastructure(deployment) is used.
1. Public cloud - it possible for anybody to access systems and
services. a third-party provider manages the servers, applications,
and storage much like a public utility.
2. Private cloud- It’s a one-on-one environment for a single user
(customer). Hosted on organization onsite datacenter.
3. Hybrid cloud- combines public and private cloud resources
4. Cloud computing services can focus on
infrastructure, web development or a cloud-
Advantages of cloud computing
8

 Cloud computing is the delivery of different services through the


Internet, including data storage, servers, databases, networking, and
software.
 Cloud-based storage makes it possible to save files to a remote
database and retrieve them on demand.
 The cloud allows you and multiple users to access your data from
any location
 Regardless of the kind of service, cloud computing services provide
users with a series of functions including:
 Email , Storage, backup, and data retrieval
 Creating and testing apps , Audio and video streaming
 Delivering software on demand
Types of cloud computing services
9

 There are three main types of cloud computing services:


1. Infrastructure-as-a-Service (IaaS),
2. Platforms-as-a-Service (PaaS),
3. Software-as-a-Service (SaaS).
Software-as-a-Service (Saas)

10
 SaaS is a service that delivers a software application which the cloud
service provider manages to its users.
 Typically, SaaS apps are web applications or mobile apps that users
can access via a web browser.
 involves the licensure of a software application to customers.
 Licenses are typically provided through a pay-as-you-go model or
on-demand.
 This type of system can be found in Microsoft Office's 365
Infrastructure-as-a-Service (Iaas)
11

 IaaS means a cloud service provider manages the infrastructure


for you
 The user has access through an API or dashboard, and essentially
rents the infrastructure.
 involves a method for delivering everything from operating
systems to servers and storage through IP-based connectivity as
part of an on-demand service.
 Clients can avoid the need to purchase software or servers, and
instead procure these resources in an outsourced, on-demand
service.
 examples :IBM Cloud and Microsoft Azure
Platforms-as-a-Service (PaaS)
12

 PaaS is considered the most complex of the three layers of


cloud-based computing.
 PaaS shares some similarities with SaaS, the primary
difference being that instead of delivering software online,
 it is actually provides a platform for creating software that is
delivered via the Internet.
 Example: Salesforce.com, Heroku, google App Engine, and
Microsoft Azure App Service
Advantage Cloud computing
13

 High Speed – Quick Deployment. ...


 Automatic Software Updates and Integration. ..
 Efficiency and Cost Reduction. ...
 Data Security. ...
 Scalability. ...
 Collaboration. ...
 Unlimited Storage Capacity. ...
 Back-up and Restore Data
Disadvantages of Cloud computing
14

 Security
 Servers maintained by cloud computing companies
may fall victim to natural disasters, internal bugs, and
power outages
 individuals accessing and manipulating information
through a single portal, inadvertent mistakes can
transfer across an entire system.
Autonomic computing (AC)
15
 Autonomic computing (AC) is an approach to address the complexity
and evolution problems in software systems.
 It is a concept in computer science that involves creating systems
capable of self-management.
 It is a self-managing computing model named after, and patterned on,
the human body’s autonomic nervous system.
 An autonomic computing system would control the functioning of
computer applications and systems without input from the user,
 in the same way, that the autonomic nervous system regulates body
systems without conscious input from the individual.
Characteristics of Autonomic Systems
16
 An autonomic system can self-configure at runtime to meet changing
operating environments, selftune to optimize its performance, self-
heal when it encounters unexpected obstacles during its operation,
and of particular current interest.
 Protect itself from malicious attacks.
 An autonomic system can self-manage anything including a single
property or multiple properties.

Autonomic Characteristics
Autonomic systems/applications exhibit eight defining
characteristics:
17

 Self-Awareness: An autonomic application/system “knows


itself” and is aware of its state and its behaviors.
 Self-Configuring: An autonomic application/system
should be able to configure and reconfigure itself under
varying and unpredictable conditions.
 Self-Optimizing: An autonomic application/system should
be able to detect suboptimal behaviors and optimize itself
to improve its execution.
Cont…
18
 Self-Healing: An autonomic application/system should be
able to detect and recover from potential problems and
continue to function smoothly.
 Self-Protecting: An autonomic application/system should
be capable of detecting and protecting its resources from
both internal and external attacks and maintaining overall
system security and integrity.
 Context-Aware: An autonomic application/system should
be aware of its execution environment and be able to react
to changes in the environment.
Cont…
19
 Open: An autonomic application/system must function in a
heterogeneous world and should be portable across multiple hardware
and software architectures.
 Consequently, it must be built on standard and open protocols and

interfaces.
 Anticipatory: An autonomic application/system should be able to
anticipate to the extent possible, its needs and behaviors and those of
its context, and be able to manage itself proactively.
Computer vision
20

 Computer vision tasks include methods for acquiring, processing,


analyzing and understanding digital images, and extraction of high-
dimensional data from the real world in order to produce numerical
or symbolic information, e.g. in the forms of decisions.
 Computer vision is building algorithms that can understand the
content of images and use it for other applications.
How computer vision works
21

 Acquiring an image: Images, even large sets, can be acquired in


real-time through video, photos or 3D technology for analysis.
 Processing the image: Deep learning models automate much of
this process, but the models are often trained by first being fed
thousands of labeled or pre-identified images.
 Understanding the image: The final step is the interpretative
step, where an object is identified or classified.
Applications of Computer vision
22
 Optical character recognition (OCR): reading handwritten postal codes on letters
 Machine inspection: rapid parts inspection for quality assurance using stereo vision
with specialized illumination to measure tolerances on aircraft wings
 Retail: object recognition for automated checkout lanes
 Medical imaging: registering pre-operative and intra-operative imagery
 Automotive safety: detecting unexpected obstacles such as pedestrians on the
street, under conditions where active vision techniques such as radar do not work
well
 Surveillance: monitoring for intruders, analyzing highway traffic
 Fingerprint recognition and biometrics: for automatic access authentication as well
Cybersecurity
23

 Cybersecurity is often confused with information security but


 It focuses on protecting computer systems from unauthorized
access or being otherwise damaged or made inaccessible.
 Information security is a broader category that looks to protect all
information assets, whether in hard copy or in digital form.
 The term cybercrime is used to describe an unlawful activity in
which computer or computing devices such as smartphones,
tablets, Personal Digital Assistants (PDAs), etc.
Some security measures to be taken to prevent cybercrimes
24

 Staff awareness training: - Human error is the leading cause of data breaches, so
you need to equip staff with the knowledge to deal with the threats they face.
 Application security: - Web application vulnerabilities are a common point of
intrusion for cybercriminals.
 Network security: - Network security is the process of protecting the usability
and integrity of your network and data
 Leadership commitment: is the key to cyber resilience. Without it, it is very
difficult to establish or enforce effective processes.
 Password management: - Almost half of the UK population uses ‘password’,
‘123456’ or ‘qwerty’ as their password.
Types of cybersecurity threats
25

 Ransomware: - It is a type of malicious software that


prevents or limits users from accessing their system.
 Malware: - itis a type of software designed to gain
unauthorized access or to cause damage to a computer
 Social engineering: - it is a tactic that adversaries use to trick
you into revealing sensitive information.
 Phishing: - it is the practice of sending fraudulent emails that
resemble emails from reputable sources
 Distributed Denial of Service (DDoS) Attacks:
 make an online service unavailable by overwhelming it with
excessive traffic from many locations and sources.
Benefits of cybersecurity
26

 Business protection against malware, ransomware, phishing, and


social engineering.
 Protection for data and networks.
 Prevention of unauthorized users.
 Improves recovery time after a breach.
 Protection for end-users.
 Improved confidence in the product for both developers and
customers.

You might also like