SlideShare a Scribd company logo
The International School of Paphos (CY020)
2017-2018 © Provided by Anthi Aristotelous
1
Chapter 11
Emerging technologies
Page 188-199
2017-2018 © Provided by Anthi Aristotelous
Emerging Technologies
• Describe emerging technologies and their possible uses in
different fields including: medicine, manufacturing, space
exploration
• Evaluate the impact of emerging technologies on individuals
and their lifestyles
• Evaluate the impact of emerging technologies on
organisations
• Evaluate the impact of emerging technologies on medicine
• Evaluate the impact of emerging technologies on the
environment
• Discuss the advantages and disadvantages of storing data in
the cloud
2
2017-2018 © Provided by Anthi Aristotelous 3
3D printing
• Is the process of making
a physical object from a
three-dimensional digital
model, using modelling
software.
• It is created by laying down
successive layers of
material, such as heated
plastic to print a single
layer at a time.
• It is a time consuming
process to produce the
final object.
2017-2018 © Provided by Anthi Aristotelous
Impact of 3D printing on medicine
• Development of prosthetics and medical products. Create
more flexible casts for broken bones.
• Aids for replacement limbs using prosthetics or with the use
of tissue engineering, using stem cell technologies to
grow new body parts and organs.
• Print artificial blood vessels for replacing damaged ones.
• Design of medical tools and equipment.
4
2017-2018 © Provided by Anthi Aristotelous
3D printing in manufacturing goods
Advantages
• Easier to customise products to
users specific requirements
• Printing is done remotely, no need
to transfer product
• Prototypes can be produced more
rapidly for testing, speed up
production
• Product may be available sooner
compared to traditional methods
• Costs may be reduced - less
specialised machinery
• Warehouse costs reduced - no
excess inventory
Disadvantages
• Limited materials available for
printing – restricted product range
• Copyright issues as it is easier to
everyone to print the product
• Dangerous items can be created
more easily
• Useless items produced and
thrown away – environmental
impact
• Limited size of products due to
size restrictions
• Printing can be quite sloe
compared to traditional
manufacturing.
5
2017-2018 © Provided by Anthi Aristotelous
4G and 5G cellular communications
• The letter G refers to the
Generation of wireless
communication.
• The signal is passed from each
cellular mast or phone tower.
The phone connects to the
nearest mobile mast and may
change if another is closer.
• This affects the signal strength
according to proximity of the
mobile mast.
6
2017-2018 © Provided by Anthi Aristotelous
Comparison of 1G to 5G
7
2017-2018 © Provided by Anthi Aristotelous
Comparison of 1G to 5G
Technology 1G 2G 3G 4G 5G
Start 1970 1980 1990 2000 2014
Development 1984 1999 2002 2010 2020
Data
Bandwidth
2 Kbps 14-64 Kbps 2 Mbps 200 Mbps >= 1 Gbps
Technology Analog
cellular
Digital cellular Broadband/
CDMA / IP
Unidentified
IP/
LAN/WAN/WL
AN
4G+WWWW
Core network PSTN PSTN Packet
network
Internet Internet
Service Mobile
telephony
Digital voice
short
message
Integrated
high quality
audio, video &
data
Dynamic
information
access,
variable
devices
Dynamic
information
access,
variable
devices
AI capabilities
8
2017-2018 © Provided by Anthi Aristotelous
Comparison of 1G to 5G
1G: only used for voice calls
2G: included slow access to the Internet, could not
assist growing number of users
3G: high broadband speeds using audio, video & data
on mobile devices
4G: enhancement of 3G, 5 times faster uploading and
downloading data. Deduction in latency allows
streaming of online videos and playing online games.
5G: data transmission 100 times faster, enabling
extremely high internet access, real-time
communication and HD video streaming.
9
2017-2018 © Provided by Anthi Aristotelous
Artificial Intelligence (AI)
• Refers to the intelligence of machines!
• AI is when a computer is able to make decisions based on
heuristic knowledge (through experience), like humans.
• AI systems are created by programming a set of rules that
must be obeyed.
• In reality AI’s can also learn from their actions and by
modifying their behavior, giving us the impression that they
can think, despite the fact they are still following programmed
instructions.
• AI is embedded in lots of new
technologies, such as building Deep
Blue gaming system, self-driving cars,
Siri and Google Now.
10
Siri
2017-2018 © Provided by Anthi Aristotelous
AI self driving cars
• Driving will be a safer tasks, by removing human error
• Will allow people with disabilities to travel independently
• Problems could occur, such as programming errors will lead
to wrong operation
• Requires improvements on voice activation commands
11
TelsaGoogle
2017-2018 © Provided by Anthi Aristotelous
Augmented Reality
12
2017-2018 © Provided by Anthi Aristotelous
Augmented Reality (AR)
• It’s the use of computer technology that overlays computer-
generated images onto the real-world environment.
• In a real-world environment whose elements are
"augmented" by computer-generated or extracted real-world
sensory input such as sound, video, graphics or GPS data.
13
Google Glass
2017-2018 © Provided by Anthi Aristotelous
Augmented Reality (AR)
• Benefits of Augmented Reality:
– Interactive and digital manipulated environment
– Builds a 3D model character or object in the real environment
– Makes games more interesting and ‘real’
– Can discover information about world, such as street names,
shops, people
• Drawbacks of Augmented Reality:
– Could lead to vision being blocked or distraction
– Issues with object recognition due to lighting or camera angle
– Concerns of security breach or issues when streaming live data
14
2017-2018 © Provided by Anthi Aristotelous
Biometrics
15
Iris scanning Fingerprint scanning
Voice recognition Security System
2017-2018 © Provided by Anthi Aristotelous
Biometrics
• It refers to metrics related to human characteristics. Biometrics
authentication (or realistic authentication) is used in computer
science as a form of identification and access control.
• Biometric values measured: heart rate, fingerprint, voice
recognition, iris recognition and even DNA patterns.
• It is commonly used for passport control where a passenger
must enter a scanner which scans their facial features and
compares them with ones stored on passport chip.
• Additionally, it is used on mobile phones or laptops, where the
user must scan their fingerprint before they can access the
system.
• Iris scanners are mostly seen of spy movies where high security
buildings or rooms are locked using this technique.
16
2017-2018 © Provided by Anthi Aristotelous
Biometrics
• Advantages of biometrics:
– Unique identification of a person’s physical characteristics
– Greater sense of security and locking personal data on
mobile devices
• Disadvantages of biometrics:
– Lack of data privacy, since an individuals personal details
are kept and stored.
– Concerns about the security of personal information in
terms of being hacked.
– Forged fingerprint or voice recognition might not be
identified and unauthorised people could gain access
17
2017-2018 © Provided by Anthi Aristotelous
Cloud Computing
• Includes a collection of servers used to store or process data.
• Enables access to share pools of resources (such as
computer networks, servers, storage, applications and
services).
18
2017-2018 © Provided by Anthi Aristotelous
Storing data in the Cloud
Benefits of cloud computing:
• Companies or individuals will not need to bare the costs of this IT
infrastructure. (Reduced IT support requirements/staff and reduced
requirements for storage devices)
• Backups are managed by the cloud company, so reduced media cost
• Can access resources from anywhere as long there’s an Internet connection
• Collaboration on documents, allows users to access work from home
Drawbacks of cloud computing:
• Requires consistent and reliable Internet connectivity
• Files might not be synchronised leading to invalid versions of data
• Security concern in terms of personal data being accessed by unauthorised
users
• Cloud service suppliers might go out of business so data is lost
• Data storage might be in different country which is subject to different laws.
19
2017-2018 © Provided by Anthi Aristotelous
Computer-assisted translation
• It is software which is given a string of text or a document for
translation in a language of user’s choice. It removes extra
elements such as pictures, tables and anything that is not
text.
• Benefits of computer-assisted translation:
– Easy and quick translation of words or phrases via mobile
phone when in a different country as long as there is
Internet connectivity
– Can translate whole documents and websites making it
possible read them.
• Drawbacks of computer-assisted translation:
– Most sites give direct translations instead of meaning
behind sentences
20
2017-2018 © Provided by Anthi Aristotelous
Holographic data storage
• Data storage medium for high capacity of data,
which saves bits in parallel way (data stored layer
upon layer).
• Benefits companies to archive vast amount of data
over a long period of time.
• These devices degrade less than others
• Major concern is the high costs for holographic
storage.
21
2017-2018 © Provided by Anthi Aristotelous
4th generation optical data storage
• Refers to the next generation of optical storage.
• The third generation allowed HD video and had the ability to
store up to 400GB.
• The 4th generation will have the potential to store up to 1TB
on optical media, using smaller lands and pits.
22
2017-2018 © Provided by Anthi Aristotelous
Holographic imaging
• Common name is holography, which is the creation of a 3D
image produced by photographic projections.
• It allows users to see object around
• Hologram is transmitted electronically to special devices at
home or workplace.
23
2017-2018 © Provided by Anthi Aristotelous
Quantum Cryptography
• Allows the transmission of data over a fiber optic cable.
• It is one of the safest methods for encrypting data not using
mathematical algorithms, but physics.
• Key is generated with photons, which are tiny packets of
light. It is made of a stream of light particles that individually
vibrate in different directions. These different vibrations is
called polarising.
• This key securely scrabbles the data and it is very difficult to
crack it.
• Once transmitted the light particles will pass through a filter
which reserves the polarisation and unscrambles the data.
• It is very successful over short distances of around 200km,
without error.
24
2017-2018 © Provided by Anthi Aristotelous
Quantum Cryptography
Watch video!
25
2017-2018 © Provided by Anthi Aristotelous
Robotics
• Robotics is the creation of computers that perform specific
tasks that humans are unable or are less efficient in
performing.
• A robot contains a processor, which is responsible to controls
it’s movement. Additionally, it requires sensors to be
attached, so they can feed data back to the processor. The
CPU is responsible for making the decisions.
• A popular example of a humanoid robot is ASIMO.
Watch ASIMO now!
26
2017-2018 © Provided by Anthi Aristotelous
Robotics
• Benefits of Robotics:
– Can perform repetitive tasks without getting bored
– Possibility to work in dangerous environments, such as
chemical factories.
– Can provide great entertainment value and support in everyday
tasks/chores.
• Drawbacks of Robotics:
– Increased unemployment as they have replaced humans in
factories.
– Have no emotions and are programmed complete only specific
tasks.
– Cause of concern with the use of AI that they will overpower
humans.
27
2017-2018 © Provided by Anthi Aristotelous
QR codes
• Quick Response (QR) codes is an example of a barcode,
which is represented with black and white squares.
• Enables to store extra information about an object that might
not be enough space on the packet.
• It is scanned using a camera (acts as a reader) which
forwards users to the relevant page of information.
28
2017-2018 © Provided by Anthi Aristotelous
How QR codes store information
• Information is stored digitally as blocks of black/white squares
• Small dots throughout code converted to binary numbers
when scanned
• Error correction algorithm used for validation
• Variety of encoding methods available which can be mixed
• Three larger squares store alignment data
• Smaller squares store angle/size data
• Scanned with narrow beam of light
• Reflection from white areas read by light sensor/camera
• May take up less space on packing.
29
2017-2018 © Provided by Anthi Aristotelous
QR codes
• Examples of where QR codes are used include:
– Gym equipment that provide details on how to operate them
and which muscles are used.
– Food or products that share company information and
additional details about item.
– Printed posters or magazines, which allow user to see more
details about marketing material.
• Concerns with using QR codes:
– Require adequate light for code to be recognised.
– Codes might be distorted when they are resized to fit product or
might not even fit on package due to space.
– Requires internet connection to access the information.
30
2017-2018 © Provided by Anthi Aristotelous
QR codes
• Benefits to advertisers of using QR codes on their products:
– Information is instantly available to consumers
– Advertiser can decide the action the consumer takes when code is
scanned
– QR codes are a proven (ISO) standard to be accessible to all
– Available information can be updated more easily
– Use of QR codes is measurable so can be analysed
– Reprinting of advertising material is reduced.
• QR codes risk from malicious code
– Code may contain URL link; Web link followed
– URL contains a Trojan that infects the device. Trojan is JavaScript which
contacts servers that transmit malware to device
– Use cross-site scripting vulnerability on a legitimate website to insert a
malicious QR code in place of code when a web browser opens the
legitimate site, the QR code references the hacker’s site
31
2017-2018 © Provided by Anthi Aristotelous
Wearable Computing
• Wearable computing is the use of wearable technology that
can be either clothing or accessories which include a
computer-based component.
• Fitness devices normally are worn on wrist to keep
measurement of activity, such as steps taken, calories burnt,
sleeping activity etc.
• Smartwatches allow pairing with
smartphone, where user can receive
calls, read messages, surf the
Internet etc.
32
2017-2018 © Provided by Anthi Aristotelous
Wearable Computing
• Smart T-shirts display a message or a gif
image and makes them look more stylish and
modern. Additionally, they have the
capability of producing music.
Watch Video!
• Issues with wearable technology:
– Easily subject to moisture which could affect the operation of
the technology
– Devices might break if they are not protected
– More expensive to purchase due to embedded technology or
protection included.
– Some devices use wireless transmission of data, which could
be subject to fraud and accessed by unauthorised people.
33
2017-2018 © Provided by Anthi Aristotelous
Police wearable computing
Benefits:
• Body worn video cameras used to record incidents for later
use in court/enquiry
• Optical head mounted technology to display information is in
a similar format to a smartphone/act as a smartphone so is
familiar
• Operated hands-free via voice activation
• Wrist-worn computer/smartphones for access to
communication systems
• Wi-Fi enabled/wireless connected clothing to track
movements in real-time/connected peripherals, such as
monitor vital signs of office and maintaining constant
communications with other
34
2017-2018 © Provided by Anthi Aristotelous
Police wearable computing
Drawbacks
• Reliance on computer can remove elements of human
judgment
• Implementation can be expensive since this is an emerging
technology
• Can lead to invasions of privacy for user and third parties
location and other details can be used to track the user.
• Possibility of wearable computers being hacked and data
stolen/computers manipulated
• Breakdown in communications systems can lead to system
failure
35
2017-2018 © Provided by Anthi Aristotelous
UHD Television
• Ultra-High Definition television, refers to the measurement of
horizontal number of pixels on the screen, such as 2560 x
1080.
• Both 4K and 8K are still very expensive technologies.
• Additionally, they are not supported by most television
channels or video games, as they are made in high
resolution.
• It is difficult to stream the content
in UHD because of the amount of
bandwidth required.
36
2017-2018 © Provided by Anthi Aristotelous
Vision Enhancement
• Gives the ability to restore or enhance vision of people, so
they are aware of their surroundings.
• It allows fully or partially impaired individuals including colour
blind people to view the same way as others.
• With the use of customised glasses or lenses they help to
stimulus the eyes and filters/enhances the vision.
37
2017-2018 © Provided by Anthi Aristotelous
Virtual Reality
38
2017-2018 © Provided by Anthi Aristotelous
Virtual Reality
• VR is a computer generated 3D space, where humans can
interact within it’s environment using specialised equipment.
• Wearable technology such as headsets, glovers with sensors
that can consistently monitor and calibrate mimicking the real
environment.
• Applications where VR is used in:
– Military to train soldiers in shooting enemies. Flight simulation
helps pilots to learn how to flying planes. Also soldiers can train
on how to jump out of planes.
– Medical procedures allow doctors to practise surgeries and gain
confidence and experience.
– Car simulation allows people to learn how to drive so they are
more confident before attempting in real life.
39
2017-2018 © Provided by Anthi Aristotelous
Virtual Reality
• Drawbacks of Virtual Reality:
– Achieving calibration between camera and user is not 100%
accurate matching real-time. In some cases users had motion
sickness because of these time difference.
– Injury caused by hitting on objects in a small room and hurting
themselves. Since their vision is partially or fully blocked from
glasses/helmets.
– In some cases users
experienced seizures due
to epileptic condition.
40
2017-2018 © Provided by Anthi Aristotelous
Impact on individuals and their lifestyles
• Smartphones can perform many tasks, which could
alternatively use PCs or laptops. So even when your on the
go, work can be done. Causes concerns for employees, as
they could still be out the office and get work send to them.
• Smart watches and wearable fitness devices allows
continuous monitoring of an individuals physical activities.
• Users have 24/7 access to online banking and online
shopping without travelling and waiting in long queues.
• AI and robotics have made daily tasks automated and easy
to perform. Despite these benefits some employees have
been replaced or lost their jobs due to robots.
• Augmented reality and virtual reality has made games and
training more interactive and enjoyable.
41
2017-2018 © Provided by Anthi Aristotelous
Impact on organizations
• 4G & 5G technologies enables use of applications, such as
video conferencing for meetings; use of mobile devices for
navigation when travelling. They can forward list of tasks to
their staff, even when they are not in work.
• Biometrics have enable organizations to secure their
workplace and access to data. They use fingerprint, retina
and facial recognition scanners to identify employees.
• Cloud storage allows companies to save their data online or
even operate specific application software for a small monthly
fee. Saving them lots of money on backup devices and
purchasing software.
• 4th generation optical storage enables faster transfer of
large quantities of data.
42
2017-2018 © Provided by Anthi Aristotelous
Impact on medicine
• The use of 4G & 5G has also affected medicine as doctors
around the world can watch and advise an operation on a
patient who is located in a different area. Since no travelling
is required they will be better prepared and more rested.
• 3D printing has benefited in many areas such as:
– development of prosthetics
– medical products
– tissue engineering
– artificial blood vessels
– the design of medical tools
and equipment
43
2017-2018 © Provided by Anthi Aristotelous
Impact on the environment
• The technologies have increased rabidly over the past years
with more technological achievements than previously.
• Improved products are released regularly making the old
ones obsolete. These products are discarded on daily basis.
• The landfills are being filled up with old technology items,
causing concerns for the environment. Some items require
special discarding as they contain chemicals.
• A solution to this problem, which has been adopted by many
countries is recycling them. Additionally, the more developed
countries can send older and used products to less
developed ones.
• Many telephone provides are also offering cash back or
vouchers, if you trade your old phone for a new one.
44
2017-2018 © Provided by Anthi Aristotelous 45
Chapter 11 Homework
1. Discuss the impact 3D printing has on medicine. [6]
2. Evaluate the impact of artificial intelligence being used to
create self-driving cars. [6]
3. Discuss the impact of emerging technologies on our
personal entertainment. [6]
[Total Marks: 18]

More Related Content

What's hot

Data recovery tools
Data recovery toolsData recovery tools
Data recovery tools
university of Gujrat, pakistan
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
lina hajjar
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
AmanuelZewdie4
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
primeteacher32
 
Security and Privacy of Machine Learning
Security and Privacy of Machine LearningSecurity and Privacy of Machine Learning
Security and Privacy of Machine Learning
Priyanka Aash
 
IT Helpdesk Monthly Report 2014-07.pptx
IT Helpdesk Monthly Report 2014-07.pptxIT Helpdesk Monthly Report 2014-07.pptx
IT Helpdesk Monthly Report 2014-07.pptx
ssuser1fd96c
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
Ambuj Kumar
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
chovatiyabhautik
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
Gol D Roger
 
Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...
Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...
Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...
Mahbubur Rahman
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
amiable_indian
 
GCSE ICT Revision
GCSE ICT RevisionGCSE ICT Revision
GCSE ICT Revision
Kelvin Lam
 
Storage devices and media
Storage devices and mediaStorage devices and media
Storage devices and media
Anjan Mahanta
 
Basic of computer
Basic of computerBasic of computer
Basic of computer
Mŕ ƛwešome
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
Piyush Jain
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Olivier Busolini
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
Manu Mathew Cherian
 
Knowledge representation in AI
Knowledge representation in AIKnowledge representation in AI
Knowledge representation in AI
Vishal Singh
 
Whitman_Ch03.pptx
Whitman_Ch03.pptxWhitman_Ch03.pptx
Whitman_Ch03.pptx
Siphamandla9
 
Processing Devices
Processing DevicesProcessing Devices
Processing Devices
itsvineeth209
 

What's hot (20)

Data recovery tools
Data recovery toolsData recovery tools
Data recovery tools
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Security and Privacy of Machine Learning
Security and Privacy of Machine LearningSecurity and Privacy of Machine Learning
Security and Privacy of Machine Learning
 
IT Helpdesk Monthly Report 2014-07.pptx
IT Helpdesk Monthly Report 2014-07.pptxIT Helpdesk Monthly Report 2014-07.pptx
IT Helpdesk Monthly Report 2014-07.pptx
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...
Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...
Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
GCSE ICT Revision
GCSE ICT RevisionGCSE ICT Revision
GCSE ICT Revision
 
Storage devices and media
Storage devices and mediaStorage devices and media
Storage devices and media
 
Basic of computer
Basic of computerBasic of computer
Basic of computer
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Knowledge representation in AI
Knowledge representation in AIKnowledge representation in AI
Knowledge representation in AI
 
Whitman_Ch03.pptx
Whitman_Ch03.pptxWhitman_Ch03.pptx
Whitman_Ch03.pptx
 
Processing Devices
Processing DevicesProcessing Devices
Processing Devices
 

Similar to 9626 GCE A2 Information Technology Chapter 11

The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
gogo6
 
5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective
Richard Scott
 
Top 10 technologies trending in 2019
Top 10 technologies trending in 2019Top 10 technologies trending in 2019
Top 10 technologies trending in 2019
Janu Jahnavi
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
IRJET Journal
 
Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!
Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!
Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!
TechWell
 
IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017
paul young cpa, cga
 
Hac IT 4. Emerging Technologies (1).pdf
Hac IT 4. Emerging Technologies  (1).pdfHac IT 4. Emerging Technologies  (1).pdf
Hac IT 4. Emerging Technologies (1).pdf
AAFREEN SHAIKH
 
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
Deploy360 Programme (Internet Society)
 
20180115 Mobile AIoT Networking-ftsai
20180115 Mobile AIoT Networking-ftsai20180115 Mobile AIoT Networking-ftsai
20180115 Mobile AIoT Networking-ftsai
Frank Chee-Da TSAI (蔡其達)
 
Internet of Aviation
Internet of AviationInternet of Aviation
Internet of Aviation
Assem mousa
 
Io t for_scm
Io t for_scmIo t for_scm
Io t for_scm
Sanura Hettiarachchi
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 Document
Ajith Kumar Ravi
 
20140514 internet ofthings_feedhenry_opt
20140514 internet ofthings_feedhenry_opt20140514 internet ofthings_feedhenry_opt
20140514 internet ofthings_feedhenry_opt
Mícheál Ó Foghlú
 
Case Study Intel IoT Gateway
Case Study Intel IoT GatewayCase Study Intel IoT Gateway
Case Study Intel IoT Gateway
John Koot
 
The Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT ImplementationThe Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT Implementation
Aditya Basu
 
Internet of Things (IoT) Fog Computing Insights from Patents
Internet of Things (IoT) Fog Computing Insights from PatentsInternet of Things (IoT) Fog Computing Insights from Patents
Internet of Things (IoT) Fog Computing Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
Technological environment
Technological environmentTechnological environment
Technological environment
Dr. Priyanka Jain
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...
Invest Northern Ireland
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
Infyiot Solutions
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
SaraPia5
 

Similar to 9626 GCE A2 Information Technology Chapter 11 (20)

The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
 
5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective
 
Top 10 technologies trending in 2019
Top 10 technologies trending in 2019Top 10 technologies trending in 2019
Top 10 technologies trending in 2019
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
 
Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!
Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!
Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!
 
IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017
 
Hac IT 4. Emerging Technologies (1).pdf
Hac IT 4. Emerging Technologies  (1).pdfHac IT 4. Emerging Technologies  (1).pdf
Hac IT 4. Emerging Technologies (1).pdf
 
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
 
20180115 Mobile AIoT Networking-ftsai
20180115 Mobile AIoT Networking-ftsai20180115 Mobile AIoT Networking-ftsai
20180115 Mobile AIoT Networking-ftsai
 
Internet of Aviation
Internet of AviationInternet of Aviation
Internet of Aviation
 
Io t for_scm
Io t for_scmIo t for_scm
Io t for_scm
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 Document
 
20140514 internet ofthings_feedhenry_opt
20140514 internet ofthings_feedhenry_opt20140514 internet ofthings_feedhenry_opt
20140514 internet ofthings_feedhenry_opt
 
Case Study Intel IoT Gateway
Case Study Intel IoT GatewayCase Study Intel IoT Gateway
Case Study Intel IoT Gateway
 
The Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT ImplementationThe Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT Implementation
 
Internet of Things (IoT) Fog Computing Insights from Patents
Internet of Things (IoT) Fog Computing Insights from PatentsInternet of Things (IoT) Fog Computing Insights from Patents
Internet of Things (IoT) Fog Computing Insights from Patents
 
Technological environment
Technological environmentTechnological environment
Technological environment
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
 

Recently uploaded

How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 

Recently uploaded (20)

How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 

9626 GCE A2 Information Technology Chapter 11

  • 1. The International School of Paphos (CY020) 2017-2018 © Provided by Anthi Aristotelous 1 Chapter 11 Emerging technologies Page 188-199
  • 2. 2017-2018 © Provided by Anthi Aristotelous Emerging Technologies • Describe emerging technologies and their possible uses in different fields including: medicine, manufacturing, space exploration • Evaluate the impact of emerging technologies on individuals and their lifestyles • Evaluate the impact of emerging technologies on organisations • Evaluate the impact of emerging technologies on medicine • Evaluate the impact of emerging technologies on the environment • Discuss the advantages and disadvantages of storing data in the cloud 2
  • 3. 2017-2018 © Provided by Anthi Aristotelous 3 3D printing • Is the process of making a physical object from a three-dimensional digital model, using modelling software. • It is created by laying down successive layers of material, such as heated plastic to print a single layer at a time. • It is a time consuming process to produce the final object.
  • 4. 2017-2018 © Provided by Anthi Aristotelous Impact of 3D printing on medicine • Development of prosthetics and medical products. Create more flexible casts for broken bones. • Aids for replacement limbs using prosthetics or with the use of tissue engineering, using stem cell technologies to grow new body parts and organs. • Print artificial blood vessels for replacing damaged ones. • Design of medical tools and equipment. 4
  • 5. 2017-2018 © Provided by Anthi Aristotelous 3D printing in manufacturing goods Advantages • Easier to customise products to users specific requirements • Printing is done remotely, no need to transfer product • Prototypes can be produced more rapidly for testing, speed up production • Product may be available sooner compared to traditional methods • Costs may be reduced - less specialised machinery • Warehouse costs reduced - no excess inventory Disadvantages • Limited materials available for printing – restricted product range • Copyright issues as it is easier to everyone to print the product • Dangerous items can be created more easily • Useless items produced and thrown away – environmental impact • Limited size of products due to size restrictions • Printing can be quite sloe compared to traditional manufacturing. 5
  • 6. 2017-2018 © Provided by Anthi Aristotelous 4G and 5G cellular communications • The letter G refers to the Generation of wireless communication. • The signal is passed from each cellular mast or phone tower. The phone connects to the nearest mobile mast and may change if another is closer. • This affects the signal strength according to proximity of the mobile mast. 6
  • 7. 2017-2018 © Provided by Anthi Aristotelous Comparison of 1G to 5G 7
  • 8. 2017-2018 © Provided by Anthi Aristotelous Comparison of 1G to 5G Technology 1G 2G 3G 4G 5G Start 1970 1980 1990 2000 2014 Development 1984 1999 2002 2010 2020 Data Bandwidth 2 Kbps 14-64 Kbps 2 Mbps 200 Mbps >= 1 Gbps Technology Analog cellular Digital cellular Broadband/ CDMA / IP Unidentified IP/ LAN/WAN/WL AN 4G+WWWW Core network PSTN PSTN Packet network Internet Internet Service Mobile telephony Digital voice short message Integrated high quality audio, video & data Dynamic information access, variable devices Dynamic information access, variable devices AI capabilities 8
  • 9. 2017-2018 © Provided by Anthi Aristotelous Comparison of 1G to 5G 1G: only used for voice calls 2G: included slow access to the Internet, could not assist growing number of users 3G: high broadband speeds using audio, video & data on mobile devices 4G: enhancement of 3G, 5 times faster uploading and downloading data. Deduction in latency allows streaming of online videos and playing online games. 5G: data transmission 100 times faster, enabling extremely high internet access, real-time communication and HD video streaming. 9
  • 10. 2017-2018 © Provided by Anthi Aristotelous Artificial Intelligence (AI) • Refers to the intelligence of machines! • AI is when a computer is able to make decisions based on heuristic knowledge (through experience), like humans. • AI systems are created by programming a set of rules that must be obeyed. • In reality AI’s can also learn from their actions and by modifying their behavior, giving us the impression that they can think, despite the fact they are still following programmed instructions. • AI is embedded in lots of new technologies, such as building Deep Blue gaming system, self-driving cars, Siri and Google Now. 10 Siri
  • 11. 2017-2018 © Provided by Anthi Aristotelous AI self driving cars • Driving will be a safer tasks, by removing human error • Will allow people with disabilities to travel independently • Problems could occur, such as programming errors will lead to wrong operation • Requires improvements on voice activation commands 11 TelsaGoogle
  • 12. 2017-2018 © Provided by Anthi Aristotelous Augmented Reality 12
  • 13. 2017-2018 © Provided by Anthi Aristotelous Augmented Reality (AR) • It’s the use of computer technology that overlays computer- generated images onto the real-world environment. • In a real-world environment whose elements are "augmented" by computer-generated or extracted real-world sensory input such as sound, video, graphics or GPS data. 13 Google Glass
  • 14. 2017-2018 © Provided by Anthi Aristotelous Augmented Reality (AR) • Benefits of Augmented Reality: – Interactive and digital manipulated environment – Builds a 3D model character or object in the real environment – Makes games more interesting and ‘real’ – Can discover information about world, such as street names, shops, people • Drawbacks of Augmented Reality: – Could lead to vision being blocked or distraction – Issues with object recognition due to lighting or camera angle – Concerns of security breach or issues when streaming live data 14
  • 15. 2017-2018 © Provided by Anthi Aristotelous Biometrics 15 Iris scanning Fingerprint scanning Voice recognition Security System
  • 16. 2017-2018 © Provided by Anthi Aristotelous Biometrics • It refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. • Biometric values measured: heart rate, fingerprint, voice recognition, iris recognition and even DNA patterns. • It is commonly used for passport control where a passenger must enter a scanner which scans their facial features and compares them with ones stored on passport chip. • Additionally, it is used on mobile phones or laptops, where the user must scan their fingerprint before they can access the system. • Iris scanners are mostly seen of spy movies where high security buildings or rooms are locked using this technique. 16
  • 17. 2017-2018 © Provided by Anthi Aristotelous Biometrics • Advantages of biometrics: – Unique identification of a person’s physical characteristics – Greater sense of security and locking personal data on mobile devices • Disadvantages of biometrics: – Lack of data privacy, since an individuals personal details are kept and stored. – Concerns about the security of personal information in terms of being hacked. – Forged fingerprint or voice recognition might not be identified and unauthorised people could gain access 17
  • 18. 2017-2018 © Provided by Anthi Aristotelous Cloud Computing • Includes a collection of servers used to store or process data. • Enables access to share pools of resources (such as computer networks, servers, storage, applications and services). 18
  • 19. 2017-2018 © Provided by Anthi Aristotelous Storing data in the Cloud Benefits of cloud computing: • Companies or individuals will not need to bare the costs of this IT infrastructure. (Reduced IT support requirements/staff and reduced requirements for storage devices) • Backups are managed by the cloud company, so reduced media cost • Can access resources from anywhere as long there’s an Internet connection • Collaboration on documents, allows users to access work from home Drawbacks of cloud computing: • Requires consistent and reliable Internet connectivity • Files might not be synchronised leading to invalid versions of data • Security concern in terms of personal data being accessed by unauthorised users • Cloud service suppliers might go out of business so data is lost • Data storage might be in different country which is subject to different laws. 19
  • 20. 2017-2018 © Provided by Anthi Aristotelous Computer-assisted translation • It is software which is given a string of text or a document for translation in a language of user’s choice. It removes extra elements such as pictures, tables and anything that is not text. • Benefits of computer-assisted translation: – Easy and quick translation of words or phrases via mobile phone when in a different country as long as there is Internet connectivity – Can translate whole documents and websites making it possible read them. • Drawbacks of computer-assisted translation: – Most sites give direct translations instead of meaning behind sentences 20
  • 21. 2017-2018 © Provided by Anthi Aristotelous Holographic data storage • Data storage medium for high capacity of data, which saves bits in parallel way (data stored layer upon layer). • Benefits companies to archive vast amount of data over a long period of time. • These devices degrade less than others • Major concern is the high costs for holographic storage. 21
  • 22. 2017-2018 © Provided by Anthi Aristotelous 4th generation optical data storage • Refers to the next generation of optical storage. • The third generation allowed HD video and had the ability to store up to 400GB. • The 4th generation will have the potential to store up to 1TB on optical media, using smaller lands and pits. 22
  • 23. 2017-2018 © Provided by Anthi Aristotelous Holographic imaging • Common name is holography, which is the creation of a 3D image produced by photographic projections. • It allows users to see object around • Hologram is transmitted electronically to special devices at home or workplace. 23
  • 24. 2017-2018 © Provided by Anthi Aristotelous Quantum Cryptography • Allows the transmission of data over a fiber optic cable. • It is one of the safest methods for encrypting data not using mathematical algorithms, but physics. • Key is generated with photons, which are tiny packets of light. It is made of a stream of light particles that individually vibrate in different directions. These different vibrations is called polarising. • This key securely scrabbles the data and it is very difficult to crack it. • Once transmitted the light particles will pass through a filter which reserves the polarisation and unscrambles the data. • It is very successful over short distances of around 200km, without error. 24
  • 25. 2017-2018 © Provided by Anthi Aristotelous Quantum Cryptography Watch video! 25
  • 26. 2017-2018 © Provided by Anthi Aristotelous Robotics • Robotics is the creation of computers that perform specific tasks that humans are unable or are less efficient in performing. • A robot contains a processor, which is responsible to controls it’s movement. Additionally, it requires sensors to be attached, so they can feed data back to the processor. The CPU is responsible for making the decisions. • A popular example of a humanoid robot is ASIMO. Watch ASIMO now! 26
  • 27. 2017-2018 © Provided by Anthi Aristotelous Robotics • Benefits of Robotics: – Can perform repetitive tasks without getting bored – Possibility to work in dangerous environments, such as chemical factories. – Can provide great entertainment value and support in everyday tasks/chores. • Drawbacks of Robotics: – Increased unemployment as they have replaced humans in factories. – Have no emotions and are programmed complete only specific tasks. – Cause of concern with the use of AI that they will overpower humans. 27
  • 28. 2017-2018 © Provided by Anthi Aristotelous QR codes • Quick Response (QR) codes is an example of a barcode, which is represented with black and white squares. • Enables to store extra information about an object that might not be enough space on the packet. • It is scanned using a camera (acts as a reader) which forwards users to the relevant page of information. 28
  • 29. 2017-2018 © Provided by Anthi Aristotelous How QR codes store information • Information is stored digitally as blocks of black/white squares • Small dots throughout code converted to binary numbers when scanned • Error correction algorithm used for validation • Variety of encoding methods available which can be mixed • Three larger squares store alignment data • Smaller squares store angle/size data • Scanned with narrow beam of light • Reflection from white areas read by light sensor/camera • May take up less space on packing. 29
  • 30. 2017-2018 © Provided by Anthi Aristotelous QR codes • Examples of where QR codes are used include: – Gym equipment that provide details on how to operate them and which muscles are used. – Food or products that share company information and additional details about item. – Printed posters or magazines, which allow user to see more details about marketing material. • Concerns with using QR codes: – Require adequate light for code to be recognised. – Codes might be distorted when they are resized to fit product or might not even fit on package due to space. – Requires internet connection to access the information. 30
  • 31. 2017-2018 © Provided by Anthi Aristotelous QR codes • Benefits to advertisers of using QR codes on their products: – Information is instantly available to consumers – Advertiser can decide the action the consumer takes when code is scanned – QR codes are a proven (ISO) standard to be accessible to all – Available information can be updated more easily – Use of QR codes is measurable so can be analysed – Reprinting of advertising material is reduced. • QR codes risk from malicious code – Code may contain URL link; Web link followed – URL contains a Trojan that infects the device. Trojan is JavaScript which contacts servers that transmit malware to device – Use cross-site scripting vulnerability on a legitimate website to insert a malicious QR code in place of code when a web browser opens the legitimate site, the QR code references the hacker’s site 31
  • 32. 2017-2018 © Provided by Anthi Aristotelous Wearable Computing • Wearable computing is the use of wearable technology that can be either clothing or accessories which include a computer-based component. • Fitness devices normally are worn on wrist to keep measurement of activity, such as steps taken, calories burnt, sleeping activity etc. • Smartwatches allow pairing with smartphone, where user can receive calls, read messages, surf the Internet etc. 32
  • 33. 2017-2018 © Provided by Anthi Aristotelous Wearable Computing • Smart T-shirts display a message or a gif image and makes them look more stylish and modern. Additionally, they have the capability of producing music. Watch Video! • Issues with wearable technology: – Easily subject to moisture which could affect the operation of the technology – Devices might break if they are not protected – More expensive to purchase due to embedded technology or protection included. – Some devices use wireless transmission of data, which could be subject to fraud and accessed by unauthorised people. 33
  • 34. 2017-2018 © Provided by Anthi Aristotelous Police wearable computing Benefits: • Body worn video cameras used to record incidents for later use in court/enquiry • Optical head mounted technology to display information is in a similar format to a smartphone/act as a smartphone so is familiar • Operated hands-free via voice activation • Wrist-worn computer/smartphones for access to communication systems • Wi-Fi enabled/wireless connected clothing to track movements in real-time/connected peripherals, such as monitor vital signs of office and maintaining constant communications with other 34
  • 35. 2017-2018 © Provided by Anthi Aristotelous Police wearable computing Drawbacks • Reliance on computer can remove elements of human judgment • Implementation can be expensive since this is an emerging technology • Can lead to invasions of privacy for user and third parties location and other details can be used to track the user. • Possibility of wearable computers being hacked and data stolen/computers manipulated • Breakdown in communications systems can lead to system failure 35
  • 36. 2017-2018 © Provided by Anthi Aristotelous UHD Television • Ultra-High Definition television, refers to the measurement of horizontal number of pixels on the screen, such as 2560 x 1080. • Both 4K and 8K are still very expensive technologies. • Additionally, they are not supported by most television channels or video games, as they are made in high resolution. • It is difficult to stream the content in UHD because of the amount of bandwidth required. 36
  • 37. 2017-2018 © Provided by Anthi Aristotelous Vision Enhancement • Gives the ability to restore or enhance vision of people, so they are aware of their surroundings. • It allows fully or partially impaired individuals including colour blind people to view the same way as others. • With the use of customised glasses or lenses they help to stimulus the eyes and filters/enhances the vision. 37
  • 38. 2017-2018 © Provided by Anthi Aristotelous Virtual Reality 38
  • 39. 2017-2018 © Provided by Anthi Aristotelous Virtual Reality • VR is a computer generated 3D space, where humans can interact within it’s environment using specialised equipment. • Wearable technology such as headsets, glovers with sensors that can consistently monitor and calibrate mimicking the real environment. • Applications where VR is used in: – Military to train soldiers in shooting enemies. Flight simulation helps pilots to learn how to flying planes. Also soldiers can train on how to jump out of planes. – Medical procedures allow doctors to practise surgeries and gain confidence and experience. – Car simulation allows people to learn how to drive so they are more confident before attempting in real life. 39
  • 40. 2017-2018 © Provided by Anthi Aristotelous Virtual Reality • Drawbacks of Virtual Reality: – Achieving calibration between camera and user is not 100% accurate matching real-time. In some cases users had motion sickness because of these time difference. – Injury caused by hitting on objects in a small room and hurting themselves. Since their vision is partially or fully blocked from glasses/helmets. – In some cases users experienced seizures due to epileptic condition. 40
  • 41. 2017-2018 © Provided by Anthi Aristotelous Impact on individuals and their lifestyles • Smartphones can perform many tasks, which could alternatively use PCs or laptops. So even when your on the go, work can be done. Causes concerns for employees, as they could still be out the office and get work send to them. • Smart watches and wearable fitness devices allows continuous monitoring of an individuals physical activities. • Users have 24/7 access to online banking and online shopping without travelling and waiting in long queues. • AI and robotics have made daily tasks automated and easy to perform. Despite these benefits some employees have been replaced or lost their jobs due to robots. • Augmented reality and virtual reality has made games and training more interactive and enjoyable. 41
  • 42. 2017-2018 © Provided by Anthi Aristotelous Impact on organizations • 4G & 5G technologies enables use of applications, such as video conferencing for meetings; use of mobile devices for navigation when travelling. They can forward list of tasks to their staff, even when they are not in work. • Biometrics have enable organizations to secure their workplace and access to data. They use fingerprint, retina and facial recognition scanners to identify employees. • Cloud storage allows companies to save their data online or even operate specific application software for a small monthly fee. Saving them lots of money on backup devices and purchasing software. • 4th generation optical storage enables faster transfer of large quantities of data. 42
  • 43. 2017-2018 © Provided by Anthi Aristotelous Impact on medicine • The use of 4G & 5G has also affected medicine as doctors around the world can watch and advise an operation on a patient who is located in a different area. Since no travelling is required they will be better prepared and more rested. • 3D printing has benefited in many areas such as: – development of prosthetics – medical products – tissue engineering – artificial blood vessels – the design of medical tools and equipment 43
  • 44. 2017-2018 © Provided by Anthi Aristotelous Impact on the environment • The technologies have increased rabidly over the past years with more technological achievements than previously. • Improved products are released regularly making the old ones obsolete. These products are discarded on daily basis. • The landfills are being filled up with old technology items, causing concerns for the environment. Some items require special discarding as they contain chemicals. • A solution to this problem, which has been adopted by many countries is recycling them. Additionally, the more developed countries can send older and used products to less developed ones. • Many telephone provides are also offering cash back or vouchers, if you trade your old phone for a new one. 44
  • 45. 2017-2018 © Provided by Anthi Aristotelous 45 Chapter 11 Homework 1. Discuss the impact 3D printing has on medicine. [6] 2. Evaluate the impact of artificial intelligence being used to create self-driving cars. [6] 3. Discuss the impact of emerging technologies on our personal entertainment. [6] [Total Marks: 18]