1
CHAPTER 7
Other Emerging Technologies
• Block chain technology
• Cloud computing
• Computer vision
• Cyber security
1. Blockchain Technology
2
Blockchain is a growing list of records, called blocks, that
are linked using cryptography.
A blockchain is a time-stamped series of immutable
records of data that is managed by a cluster of computers
not owned by any single entity.
“Blocks” on the blockchain are made up of digital pieces
of information.
Blocks store information about transactions like the date, time,
and dollar amount of your most recent transaction.
Blocks store information about who is participating in
transactions.
Blocks store information that distinguishes them from other
blocks.
Cont…
3
In order for a block to be added to the
blockchain, four things must happen:
1. A transaction must occur.
2. That transaction must be verified.
3. That transaction must be stored in a block.
4. That block must be given a hash.
Thus, blockchain is "an open, distributed
ledger that can record transactions
between two parties efficiently and in a
verifiable and permanent way".
For use as a distributed ledger, a blockchain
is typically managed by a peer-to-peer
network collectively adhering to a protocol for
Three Pillars of Blockchain Technology
4
The three main properties of Blockchain
Technology are:
1. Decentralization
The information is not stored by one single
entity.
2. Transparency
Most interesting and no misunderstood
concepts in blockchain technology.
3. Immutability
Once something has been entered into the
blockchain, it cannot be tampered with.
Cont…
5
The reason why the blockchain has gained so much
admiration is that:
It is not owned by a single entity, hence it is decentralized.
The data is cryptographically stored inside
The blockchain is immutable, so no one can tamper with the data
that is inside the blockchain.
The blockchain is transparent so one can track the data if they
want
Application of blockchain
6
File storage
The sharing economy
Crowdfunding
Governance
Supply chain auditing
Cryptocurrencies
Finance
Voting Systems
2. Cloud Computing
7
Cloud computing is a means of networking remote servers that are
hosted on the Internet.
Rather than storing and processing data on a local server, or a PC's
hard drive, one of the following three types of cloud
infrastructure(deployment) is used.
1. Public cloud - it possible for anybody to access systems and
services. a third-party provider manages the servers, applications,
and storage much like a public utility.
2. Private cloud- It’s a one-on-one environment for a single user
(customer). Hosted on organization onsite datacenter.
3. Hybrid cloud- combines public and private cloud resources
4. Cloud computing services can focus on
infrastructure, web development or a cloud-
Advantages of cloud computing
8
Cloud computing is the delivery of different services through the
Internet, including data storage, servers, databases, networking, and
software.
Cloud-based storage makes it possible to save files to a remote
database and retrieve them on demand.
The cloud allows you and multiple users to access your data from
any location
Regardless of the kind of service, cloud computing services provide
users with a series of functions including:
Email , Storage, backup, and data retrieval
Creating and testing apps , Audio and video streaming
Delivering software on demand
Types of cloud computing services
9
There are three main types of cloud computing services:
1. Infrastructure-as-a-Service (IaaS),
2. Platforms-as-a-Service (PaaS),
3. Software-as-a-Service (SaaS).
Software-as-a-Service (Saas)
10
SaaS is a service that delivers a software application which the cloud
service provider manages to its users.
Typically, SaaS apps are web applications or mobile apps that users
can access via a web browser.
involves the licensure of a software application to customers.
Licenses are typically provided through a pay-as-you-go model or
on-demand.
This type of system can be found in Microsoft Office's 365
Infrastructure-as-a-Service (Iaas)
11
IaaS means a cloud service provider manages the infrastructure
for you
The user has access through an API or dashboard, and essentially
rents the infrastructure.
involves a method for delivering everything from operating
systems to servers and storage through IP-based connectivity as
part of an on-demand service.
Clients can avoid the need to purchase software or servers, and
instead procure these resources in an outsourced, on-demand
service.
examples :IBM Cloud and Microsoft Azure
Platforms-as-a-Service (PaaS)
12
PaaS is considered the most complex of the three layers of
cloud-based computing.
PaaS shares some similarities with SaaS, the primary
difference being that instead of delivering software online,
it is actually provides a platform for creating software that is
delivered via the Internet.
Example: Salesforce.com, Heroku, google App Engine, and
Microsoft Azure App Service
Advantage Cloud computing
13
High Speed – Quick Deployment. ...
Automatic Software Updates and Integration. ..
Efficiency and Cost Reduction. ...
Data Security. ...
Scalability. ...
Collaboration. ...
Unlimited Storage Capacity. ...
Back-up and Restore Data
Disadvantages of Cloud computing
14
Security
Servers maintained by cloud computing companies
may fall victim to natural disasters, internal bugs, and
power outages
individuals accessing and manipulating information
through a single portal, inadvertent mistakes can
transfer across an entire system.
Autonomic computing (AC)
15
Autonomic computing (AC) is an approach to address the complexity
and evolution problems in software systems.
It is a concept in computer science that involves creating systems
capable of self-management.
It is a self-managing computing model named after, and patterned on,
the human body’s autonomic nervous system.
An autonomic computing system would control the functioning of
computer applications and systems without input from the user,
in the same way, that the autonomic nervous system regulates body
systems without conscious input from the individual.
Characteristics of Autonomic Systems
16
An autonomic system can self-configure at runtime to meet changing
operating environments, selftune to optimize its performance, self-
heal when it encounters unexpected obstacles during its operation,
and of particular current interest.
Protect itself from malicious attacks.
An autonomic system can self-manage anything including a single
property or multiple properties.
Autonomic Characteristics
Autonomic systems/applications exhibit eight defining
characteristics:
17
Self-Awareness: An autonomic application/system “knows
itself” and is aware of its state and its behaviors.
Self-Configuring: An autonomic application/system
should be able to configure and reconfigure itself under
varying and unpredictable conditions.
Self-Optimizing: An autonomic application/system should
be able to detect suboptimal behaviors and optimize itself
to improve its execution.
Cont…
18
Self-Healing: An autonomic application/system should be
able to detect and recover from potential problems and
continue to function smoothly.
Self-Protecting: An autonomic application/system should
be capable of detecting and protecting its resources from
both internal and external attacks and maintaining overall
system security and integrity.
Context-Aware: An autonomic application/system should
be aware of its execution environment and be able to react
to changes in the environment.
Cont…
19
Open: An autonomic application/system must function in a
heterogeneous world and should be portable across multiple hardware
and software architectures.
Consequently, it must be built on standard and open protocols and
interfaces.
Anticipatory: An autonomic application/system should be able to
anticipate to the extent possible, its needs and behaviors and those of
its context, and be able to manage itself proactively.
Computer vision
20
Computer vision tasks include methods for acquiring, processing,
analyzing and understanding digital images, and extraction of high-
dimensional data from the real world in order to produce numerical
or symbolic information, e.g. in the forms of decisions.
Computer vision is building algorithms that can understand the
content of images and use it for other applications.
How computer vision works
21
Acquiring an image: Images, even large sets, can be acquired in
real-time through video, photos or 3D technology for analysis.
Processing the image: Deep learning models automate much of
this process, but the models are often trained by first being fed
thousands of labeled or pre-identified images.
Understanding the image: The final step is the interpretative
step, where an object is identified or classified.
Applications of Computer vision
22
Optical character recognition (OCR): reading handwritten postal codes on letters
Machine inspection: rapid parts inspection for quality assurance using stereo vision
with specialized illumination to measure tolerances on aircraft wings
Retail: object recognition for automated checkout lanes
Medical imaging: registering pre-operative and intra-operative imagery
Automotive safety: detecting unexpected obstacles such as pedestrians on the
street, under conditions where active vision techniques such as radar do not work
well
Surveillance: monitoring for intruders, analyzing highway traffic
Fingerprint recognition and biometrics: for automatic access authentication as well
Cybersecurity
23
Cybersecurity is often confused with information security but
It focuses on protecting computer systems from unauthorized
access or being otherwise damaged or made inaccessible.
Information security is a broader category that looks to protect all
information assets, whether in hard copy or in digital form.
The term cybercrime is used to describe an unlawful activity in
which computer or computing devices such as smartphones,
tablets, Personal Digital Assistants (PDAs), etc.
Some security measures to be taken to prevent cybercrimes
24
Staff awareness training: - Human error is the leading cause of data breaches, so
you need to equip staff with the knowledge to deal with the threats they face.
Application security: - Web application vulnerabilities are a common point of
intrusion for cybercriminals.
Network security: - Network security is the process of protecting the usability
and integrity of your network and data
Leadership commitment: is the key to cyber resilience. Without it, it is very
difficult to establish or enforce effective processes.
Password management: - Almost half of the UK population uses ‘password’,
‘123456’ or ‘qwerty’ as their password.
Types of cybersecurity threats
25
Ransomware: - It is a type of malicious software that
prevents or limits users from accessing their system.
Malware: - itis a type of software designed to gain
unauthorized access or to cause damage to a computer
Social engineering: - it is a tactic that adversaries use to trick
you into revealing sensitive information.
Phishing: - it is the practice of sending fraudulent emails that
resemble emails from reputable sources
Distributed Denial of Service (DDoS) Attacks:
make an online service unavailable by overwhelming it with
excessive traffic from many locations and sources.
Benefits of cybersecurity
26
Business protection against malware, ransomware, phishing, and
social engineering.
Protection for data and networks.
Prevention of unauthorized users.
Improves recovery time after a breach.
Protection for end-users.
Improved confidence in the product for both developers and
customers.