For decades computer scientists have strived to build powerful machines that can faster than the human and store more information.Innovation of classroom is a productive environment where students can develop the skills, talent and ability they will need in the workplace and teachers facilitate their learning. 21st century classrooms enhance the learning experience and better prepare students for higher education and workforce. Many characteristics associated with it which distinguishes from the classrooms of the past centuries.
Student-centric, Computing devices, Active learning, Invitational environment
Here are slides of how technology moves
Computer System and Its Components
- Motherboard
- CPU
- Difference GUI And CUI
Characteristics Of Computer
- Block diagram of computer
- Input unit
- Output unit
- Memory unit
TYPES OF COMPUTER MEMORY (RAM and ROM)
- Random Access Memory (RAM)
- Difference between DRAM and SRAM
- Read Only Memory (ROM)
OTHER TYPES OF MEMORY
- Cache memory
- Sequential Access Memory
- Random access memory
- Classification Of Memory
Control Unit
ALU
Input / Output function and characteristics
Memory – RAM ROM and other types of memory
Storage fundamentals – primary vs secondary data storage
Computer System and Its Components
- Motherboard
- CPU
- Difference GUI And CUI
Characteristics Of Computer
- Block diagram of computer
- Input unit
- Output unit
- Memory unit
TYPES OF COMPUTER MEMORY (RAM and ROM)
- Random Access Memory (RAM)
- Difference between DRAM and SRAM
- Read Only Memory (ROM)
OTHER TYPES OF MEMORY
- Cache memory
- Sequential Access Memory
- Random access memory
- Classification Of Memory
Control Unit
ALU
Input / Output function and characteristics
Memory – RAM ROM and other types of memory
Storage fundamentals – primary vs secondary data storage
Introduction to Computer Science by GoLearningBus.
In this slideshow we will cover:
What is Computer Science?
What is Computer System?
What is Computation?
Types of Computing
Computer Organization
Hardware and Software
Operating System
please email your feedback to team@wagmob.com
For full access please go to app.wagmob.com and search for "computer science"
An Overview of Artificial intelligence (Part 1)Vijay R. Joshi
This PPT is part 1 which gives a short overview about Artificial Intelligence, its Application , what contributes to AI , techniques of AI, History of AI etc.
Artificial Intelligence Vs Human IntelligenceManikant Rai
While AI researchers are trying to replicate our mental functions, many people are scared that AI will replace them. Hundreds of jobs such as drivers, radiologists and cashiers are facing substitution with machines in the next 5 years. Who’s next? To get a better idea what is coming we need a better understanding in which domains AI is stronger than humans and vice-versa.
An output device is computer hardware that uses received data and commands from a computer in order to perform a task.
Any peripheral that receives data from a computer, usually for display, projection, or physical reproduction.
Computer hardware equipment used to communicate the results of data processing carried out by a computer to the outside world.
Components of computer, CPU computer funfament pptDeepuVishwakarma
Components of computer, CPU computer fundamental ppt
References = computer fundamental book
published by = P.K Sinha
Course= BCA ,Sem=1,Yr=1
presentation- 13 slides
contents=all the components of computer
A presentation on Classification of Computers.
Panjab University, Chandigarh
Classification of Computers
The computer systems can be classified on the following basis:
1. On the basis of size.
2. On the basis of functionality.
3. On the basis of data handling.
Introduction to Computer Science by GoLearningBus.
In this slideshow we will cover:
What is Computer Science?
What is Computer System?
What is Computation?
Types of Computing
Computer Organization
Hardware and Software
Operating System
please email your feedback to team@wagmob.com
For full access please go to app.wagmob.com and search for "computer science"
An Overview of Artificial intelligence (Part 1)Vijay R. Joshi
This PPT is part 1 which gives a short overview about Artificial Intelligence, its Application , what contributes to AI , techniques of AI, History of AI etc.
Artificial Intelligence Vs Human IntelligenceManikant Rai
While AI researchers are trying to replicate our mental functions, many people are scared that AI will replace them. Hundreds of jobs such as drivers, radiologists and cashiers are facing substitution with machines in the next 5 years. Who’s next? To get a better idea what is coming we need a better understanding in which domains AI is stronger than humans and vice-versa.
An output device is computer hardware that uses received data and commands from a computer in order to perform a task.
Any peripheral that receives data from a computer, usually for display, projection, or physical reproduction.
Computer hardware equipment used to communicate the results of data processing carried out by a computer to the outside world.
Components of computer, CPU computer funfament pptDeepuVishwakarma
Components of computer, CPU computer fundamental ppt
References = computer fundamental book
published by = P.K Sinha
Course= BCA ,Sem=1,Yr=1
presentation- 13 slides
contents=all the components of computer
A presentation on Classification of Computers.
Panjab University, Chandigarh
Classification of Computers
The computer systems can be classified on the following basis:
1. On the basis of size.
2. On the basis of functionality.
3. On the basis of data handling.
Humans vs Machines: An MT cost benefit analysisRDC
In this presentation we compare machine translation with human translation. We look at a side by side comparison of workflows and a cost benefit analisys.
Contents lists available at ScienceDirect
Computers in Human Behavior
journal homepage: www.elsevier.com/locate/comphumbeh
TITLE : The relationships among service quality, perceived value, customer satisfaction, and post-purchase intention in mobile value-added services
a b s t r a c t : The purposes of this study are to construct an instrument to evaluate service quality of mobile valueadded services and have a further discussion of the relationships among service quality, perceived value,
customer satisfaction, and post-purchase intention. Structural equation modeling and multiple regression
analysis were used to analyze the data collected from college and graduate students of 15 major universities
in Taiwan. The main findings are as follows: (1) service quality positively influences both perceived value and customer satisfaction; (2) perceived value positively influences on both customer satisfaction and post-purchase intention; (3) customer satisfaction positively influences post-purchase
intention; (4) service quality has an indirect positive influence on post-purchase intention through customer
satisfaction or perceived value; (5) among the dimensions of service quality, ‘‘customer service and
system reliability” is most influential on perceived value and customer satisfaction, and the influence of
‘‘content quality” ranks second; (6) the proposed model is proven with the effectiveness in explaining the relationships among service quality, perceived value, customer satisfaction, and post-purchase intention in mobile added-value services.
a r t i c l e i n f o
Article history:
Available online 11 April 2009
Keywords:
Mobile value-added services
Service quality
Perceived value
Customer satisfaction
Post-purchase intention
Abstract
Human–computer interaction is a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use. The field formally emerged out of computer science, cognitive psychology and industrial design through the 1960s, formulating guidelines for the development of interactive computer systems highlighting usability concerns for improved interfaces. Computing devices are becoming more prevalent and integrated into both our social and work spaces.HCI therefore plays an important role in ensuring that computer systems are not only functional but also respect the needs and capabilities of the humans that use them.
HCI encompasses not only ease of use but also new interaction techniques. It involves input and output devices and the interaction techniques that use them; presentation of information, control and monitoring of computer’s actions and the processes that developers follow when creating interfaces. In this seminar, emphasis is laid on the movement of a user’s eyes which can provide a convenient, natural, and high-bandwidth source of additional user input. Some of the human factors and technical considerations that arise in trying to use eye movements as an input medium and the first eye movement-based interaction techniques are discussed in this section.
AYUSHA PATNAIK,
SEM - 6th
TRIDENT ACADEMY OF TECHNOLOGY,
BBSR
Citizen Science / Human Computation talk given at Vilnius Girls Code meetup 2016-05-03.
Contains links to Citizen Science resources: project catalogues (incl. SciStarter), info links, The Crowd & The Cloud documentary trailers, my articles.
Blending Human Computing and Recommender Systems for Personalized Style Recom...Eric Colson
Presented at ACM RecSys 2014
Machine algorithms are great for tasks that require processing of large amounts of objective and structured data. However, they have difficulty with tasks that are relatively simple for skilled humans – For example, interpreting concepts in an image, or discerning tone in language, ..etc. Yet, there is a class of problems that call for precisely the combination of these tasks. This concept of human-assisted algorithmic processing is not new. It is inherent to many processes that we are familiar with. However, there are very few systems that embrace humans and machines as two resources within a single system. Instead, they are often independent and non-collaborating agents. In this talk, we explain how a single task-processing system can be architected to use diverse resources: be they human or machine. Such a system not only better utilizes each resource, but also produces better results and gets better with experience.
Robots have now replaced many daily functions of humans. Our world has become more automated than ever with machines that do some amazing tasks - functionally and just for fun.
This presentation is about the Blue Brain project of IBM. Blue brain is a simple chip that can be installed into the human brain for which the short term memory and volatile memory at the old age can be avoided. Virtual brain is an artificial brain, which does not actually the natural brain, but can act as the brain. Intelligence ,Knowledge and skill of a person can be made eternal. The complete information about the blue brain project is present in the presentation.
When I was president of the SUNY Cortland Physics Club, I tried introducing Linux distros and the UNIX OS to the club at large, including installing Linux on the club computers. Funny story, one time when messing around in Ubuntu I deleted the Bootloader by accident, and spent hours trying to get the computer to load back up. I was so proud when I figured it out that I didn't even fix the problem, I just left a sticky note telling other people how to boot the computer up if they wanted to use it
Imagine a day when you will be able to transfer your memories onto a computer. A day when you will have a ‘backup’ of everything that is stored in your head right now.
Security Privacy Operating System and Artificial IntelligenceMark John Lado, MIT
Topics:
Introduction to Security and Privacy
Introduction to Operating System
Introduction to Artificial Intelligence
Objectives:
Distinguish the importance of cryptography.
Analyze decoding and encoding.
Engage in different Operating System.
Evaluate the role of Operating System in a device.
Know about Artificial Intelligence.
Identify the different types of Artificial Intelligence.
An introduction to AI (artificial intelligence)Bellaj Badr
An introduction to AI (artificial intelligence)
The ppt link is available bellow https://docs.google.com/presentation/d/1-oaO75DEdP259HNrrvh5fbZVOtaiiiffi3luyv0tShw/edit?usp=sharing
you could leave your comments on google slides
Artificial Intelligence Research Topics for PhD Manuscripts 2021 - PhdassistancePhD Assistance
Imagine a world where knowledge isn’t limited to humans!!! A world in which computers will think and collaborate with humans to create a more exciting universe. Although this future is still a long way off, Artificial Intelligence has made significant progress in recent years. In almost every area of AI, such as quantum computing, healthcare, autonomous vehicles, the internet of things, robotics, and so on, there is a lot of research going on. So much so that the number of annual Published Research Papers on Artificial Intelligence has increased by 90% since 1996.
Ph.D. Assistance serves as an external mentor to brainstorm your idea and translate that into a research model. Hiring a mentor or tutor is common and therefore let your research committee know about the same. We do not offer any writing services without the involvement of the researcher.
Learn More: https://bit.ly/2Sdlfn4
Contact Us:
Website: https://www.phdassistance.com/
UK NO: +44–1143520021
India No: +91–4448137070
WhatsApp No: +91 91769 66446
Email: info@phdassistance.com
Deep learning is an emerging topic in artificial intelligence (AI). A subcategory of machine learning, deep learning deals with the use of neural networks to improve things like speech recognition, computer vision, and natural language processing. It's quickly becoming one of the most sought-after fields in computer science. In the last few years, deep learning has helped forge advances in areas as diverse as object perception, machine translation, and voice recognition--all research topics that have long been difficult for AI researchers to crack.
Computer Science Terms Need To know AboutHave you ever spent.docxpatricke8
Computer Science Terms Need To know About
Have you ever spent time with a group of computers or IT professionals talking about the store? Terms like "LAN", "RAM" and "bandwidth" entered the conversation and you had no idea what that meant. It can be a little intimidating to hear all that tech jargon thrown around. But don't let a small language barrier stop you from enrolling in
computer science terms
.
Just because you're new to the game doesn't mean you need to be left out of the conversation. With a little preparation, you can impress your classmates on the first day of school with your computer know-how.
To get you started, we've compiled this basic list of computer terms you should decode before setting foot in class. Brush up on this common vocabulary and you'll be up to speed with your tech friends' conversations in no time.
25 computer terms you need to know
Each industry has its own jargon, and computing is no exception. Become familiar with these 25 computer terms to impress your classmates and teachers from day one.
1. Analog
Analog technology is any part of the technology that does its job without processing numbers electronically like a computer does. You might think of analog as "old school" technology, like movie cameras or tape recorders.
2. Bandwidth
This term refers to the amount of information that can be transmitted or processed, wirelessly or over a wired connection. Internet services will advertise high speeds measured in bandwidth, so it is a well known component of the IT world.
3. Big data
Big data is a quick way to refer to the huge amounts of data that companies collect on a daily basis. Businesses face a number of big data management challenges, especially when it comes to analytics and security.
4. Bit
Bit stands for "binary binary", the smallest piece of information used by a computer. Each piece is 1 or 0, which are binary numbers that make up a computer language. Pieces are literally the foundation on which computing is built. Because they are so small, computer wizards require basic technology to think of pieces on a larger scale:
Byte = 8 beats
Kilobytes = 1024 bytes
Megabytes = 1024 kilobytes
Gigabytes = 1024 megabytes
5. Bugs
A bug is a programming error that causes wisdom or unexpected problems for the end user of a program.
6. Cloud storage
Cloud storage is another way to store data in the physical memory of a computer. Information stored "in the cloud" is stored on remote servers that can be accessed anywhere over the Internet.
7. Code
Code refers to various programming languages used to create, modify or manage computer programs or applications. Most computer science students specialize in a handful of programming languages depending on the career they would like to pursue.
8. Control panel
Just as it sounds, the control panel is a tool that allows you to change or modify the program's settings as it looks or behaves.
9. CPU
CPU stands for Central Processing Unit, which i.
Viruses are typically attached to an executable file or a word document. They often spread via P2P file sharing, infected websites, and email attachment downloads.
High Tech Staff provides scientific and technical facilities to Engineering, Information Technology, Scientific, Daily life, Health and Education. These stuffs are reliable, high quality solutions to users based on innovation, while sustaining a challenging and rewarding work for environment. Here you can take review about latest tech news, upcoming smart gadgets in market and its features.
Portable computers have been around for much longer than people imagine, though they’ve changed unimaginably from the first stumbling steps to the thin and powerful machines we have today.
A History of laptops describes the efforts in the 1970s and 1980s to build small, portable personal computers that combine the components, inputs, outputs and capabilities of a desktop computer in a small chassis.
Desktop Computers are still having their unique importance in our modern lifestyle. We generally love to use desktop computers in our home, offices, etc. Desktops are the ones which firstly arrived as a computational machine in 1970s.
Want to know more? Here is an interesting presentation about Evolution of desktop.
It is a energy efficient to rebuild old computers, about 40 percent of PCs ever find their way to a second user. Reuse electronics reduces pollution, save energy, and conserves resources .
Bits and Bytes both measure amounts of data. However, they are typically used in two different contexts.
Computer memory is usually measured in megabytes or gigabytes. This tells how much information your computer can store.
The speed of a modem (a device that connects two computers over a telephone line) is measured in bits per second, or bps. This tells how much information can be sent in a second.
These slides show terms and division of bits and bytes
Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth.
It has been more than a decade since IBM stopped making ThinkPad laptops. The company formerly known as Legend computers of Beijing, China still produces the well-regarded laptop line.
In 2007, 82% equaling 1.8 million tons of e-waste (various electronics e.g. TVs, cell phones, computers etc) ended up in landfills. Recycling can really make a difference in the environment and it is something that more and more people should begin to do. Here are a few facts about IT recycling .
All the Applications, Web pages, Programming Codes are written in a specific computer language. It’s interesting to see where computer languages on track and how they have evolved over time. There are now a series of computer languages to choose from and billions lines of code. Check out the Slides to see the computer language timeline and about code along the way.
If your laptop's hard drive has gone down and you are facing other problems then you should replace it before losing the data. Replacing a hard drive is usually a easy and straightforward procedure; and if things get tricky, our slides will help you do the job safely and professionally.
There are several methods that viruses can use to spread. They take advantage of a weaknesses in computer programs or people. They may spread several ways.
The developments in technology as without it we wouldn’t be here.
Even if you think back to a decade ago, technology has radically changed. We now all carry around smart phones in our pockets that have instant access to the internet, cameras, calculators, and pretty much any piece of technology we might need on-the-go. In the past, we didn't have it so simple, even though we thought we were innovative at the time. My, how everything has changed.
There are a number of advantages to the new formats of learning, support to multimedia educational experience. With the advent and improvements on computer, digital and Internet technology, the shift from the traditional classroom experience to online or distance learning only seems natural.
If user like features of Mac OS X but prefers to stick with Windows, its can Transformation will make Windows look like OS X. User can change the appearance of whole system, including the login screen, icons, wallpapers, sounds, dialog boxes . Here are simple methods.
With Windows 10, Microsoft is trying to maintain some of the touch and tablet features it created for Windows 8, combine them with the recognizable Start menu and desktop, and run it all on top of an better operating system with more security, a new browser, the Cortana assistant, its own version of Office for on-the-go editing and plenty of new features planned to make life simpler.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Key Trends Shaping the Future of Infrastructure.pdf
Human vs Computer
1.
2. Brains Are Analogue and Computers Are Digital
It’s easy to think that neurons are essentially binary, given that they fire an
action potential if they reach a certain threshold, and otherwise do not fire. This
superficial similarity to digital “1’s and 0’s” belies a wide variety of continuous
and non-linear processes that directly influence neuronal processing.
In computers, information in memory is accessed by polling its precise memory
address. This is known as byte-addressable memory. In contrast, the brain uses
content-addressable memory, such that information can be accessed in memory
through “spreading activation” from closely related concepts.
3. Human Memory and Computer Memory
In some ways, human memory and computer memory are similar. For
example, some general characteristics of human short-term memory
resemble those of a computer’s random access memory (RAM). Human
short-term memory is volatile and has a limited capacity. Computer RAM has
essentially the same characteristics. Your computer often does not have
enough memory to run certain programs, and when you turn it off, bye-bye
data!
4. Human Virus and Computer Virus
In computer security, computer virus is a self-replicating computer
program that spreads by inserting copies of itself into other
executable code or documents. Biological virus spreads by inserting
itself into living cells. Extending the analogy, the insertion of a virus
into the program is termed as an “infection”, and the infected file, or
executable code that is not part of a file, is called a “host”.
5. Human Speed and Computer Speed
The world’s most powerful supercomputer, the K from Fujitsu, computes four
times faster and holds 10 times as much data. And of course, many more bits
are coursing through the Internet at any moment. The human genome, which
grows our body and directs us through years of complex life, requires less data
than a laptop operating system. Even a cat’s brain smokes the newest iPad—
1,000 times more data storage and a million times quicker to act on it.